Results 151 to 160 of about 10,393 (185)
Some of the next articles are maybe not open access.

Public Key Encryption with Conjunctive Field Keyword Search

2005
In a public key encryption, we may want to enable someone to test whether something is a keyword in a given document without leaking anything else about the document. An email gateway, for example, may be desired to test whether the email contains a keyword “urgent” so that it could route the email accordingly, without leaking any content to the ...
Park, DJ, Kim, K, Lee, PJ
openaire   +2 more sources

Public key encryption with keyword search based on factoring

2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, 2012
Public key encryption with keyword search (PKES) enables senders to send encrypted data to a Freceiver like traditional public key encryption (PKE) schemes. The difference between PKES and PKE is that the receiver in PKES can search on the encrypted data which is stored on the third-party server (like a cloud storage server). As far as we know, most of
Wenjun Luo, Jianming Tan
openaire   +1 more source

The Public Verifiability of Public Key Encryption with Keyword Search

2018
Cloud computing has been widely recognized as the next big thing in this era. Users outsourced data to cloud server and cloud server provided service economic savings and various convenience for users. Public key encryption with keyword search (PEKS) which provides a solution for a third party user to search on remote data encrypted by data owner ...
Binrui Zhu   +3 more
openaire   +1 more source

Constructing pairing-free certificateless public key encryption with keyword search

Frontiers of Information Technology & Electronic Engineering, 2019
Searchable public key encryption enables a storage server to retrieve the publicly encrypted data without revealing the original data contents. It offers a perfect cryptographic solution to encrypted data retrieval in encrypted data storage systems. Certificateless cryptography (CLC) is a novel cryptographic primitive that has many merits. It overcomes
Yang Lu, Ji-guo Li
openaire   +1 more source

Public-key Authenticated Encryption with Keyword Search

Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, 2022
Zi-Yuan Liu   +4 more
openaire   +1 more source

Improved secure server-designated public key encryption with keyword search

2017 Conference on Information and Communication Technology (CICT), 2017
Cloud storage service serves the need of data sharing between multiple parties. Cloud storage services allow the data owners to outsource their encrypted records to store over cloud storage servers and authorizes multiple users to access these files.
Nitish Andola   +3 more
openaire   +1 more source

Public key encryption with distributed keyword search

Journal of Discrete Mathematical Sciences and Cryptography, 2021
Ziba Eslami   +2 more
openaire   +1 more source

An efficient public key encryption with conjunctive-subset keywords search

Journal of Network and Computer Applications, 2011
Since Boneh et al. proposed the notion and construction of Public Key Encryption with Keyword Search (PEKS) scheme, many revisions and extensions have been given. Conjunctive keyword search is one of these extensions, however, most of these constructed schemes can not solve conjunctive with subset keywords search function.
Bo Zhang, Fangguo Zhang
openaire   +1 more source

SGX-Based Public Key Encryption with Keyword Search

The Journal of Korean Institute of Communications and Information Sciences, 2021
Hyundo Yoon, Junbeom Hur
openaire   +1 more source

Pairing-Free Public-Key Authenticated Encryption with Keyword Search

Computer Standards & Interfaces, 2023
Lisha Bai   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy