Results 151 to 160 of about 10,393 (185)
Some of the next articles are maybe not open access.
Public Key Encryption with Conjunctive Field Keyword Search
2005In a public key encryption, we may want to enable someone to test whether something is a keyword in a given document without leaking anything else about the document. An email gateway, for example, may be desired to test whether the email contains a keyword “urgent” so that it could route the email accordingly, without leaking any content to the ...
Park, DJ, Kim, K, Lee, PJ
openaire +2 more sources
Public key encryption with keyword search based on factoring
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, 2012Public key encryption with keyword search (PKES) enables senders to send encrypted data to a Freceiver like traditional public key encryption (PKE) schemes. The difference between PKES and PKE is that the receiver in PKES can search on the encrypted data which is stored on the third-party server (like a cloud storage server). As far as we know, most of
Wenjun Luo, Jianming Tan
openaire +1 more source
The Public Verifiability of Public Key Encryption with Keyword Search
2018Cloud computing has been widely recognized as the next big thing in this era. Users outsourced data to cloud server and cloud server provided service economic savings and various convenience for users. Public key encryption with keyword search (PEKS) which provides a solution for a third party user to search on remote data encrypted by data owner ...
Binrui Zhu +3 more
openaire +1 more source
Constructing pairing-free certificateless public key encryption with keyword search
Frontiers of Information Technology & Electronic Engineering, 2019Searchable public key encryption enables a storage server to retrieve the publicly encrypted data without revealing the original data contents. It offers a perfect cryptographic solution to encrypted data retrieval in encrypted data storage systems. Certificateless cryptography (CLC) is a novel cryptographic primitive that has many merits. It overcomes
Yang Lu, Ji-guo Li
openaire +1 more source
Public-key Authenticated Encryption with Keyword Search
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, 2022Zi-Yuan Liu +4 more
openaire +1 more source
Improved secure server-designated public key encryption with keyword search
2017 Conference on Information and Communication Technology (CICT), 2017Cloud storage service serves the need of data sharing between multiple parties. Cloud storage services allow the data owners to outsource their encrypted records to store over cloud storage servers and authorizes multiple users to access these files.
Nitish Andola +3 more
openaire +1 more source
Public key encryption with distributed keyword search
Journal of Discrete Mathematical Sciences and Cryptography, 2021Ziba Eslami +2 more
openaire +1 more source
An efficient public key encryption with conjunctive-subset keywords search
Journal of Network and Computer Applications, 2011Since Boneh et al. proposed the notion and construction of Public Key Encryption with Keyword Search (PEKS) scheme, many revisions and extensions have been given. Conjunctive keyword search is one of these extensions, however, most of these constructed schemes can not solve conjunctive with subset keywords search function.
Bo Zhang, Fangguo Zhang
openaire +1 more source
SGX-Based Public Key Encryption with Keyword Search
The Journal of Korean Institute of Communications and Information Sciences, 2021Hyundo Yoon, Junbeom Hur
openaire +1 more source
Pairing-Free Public-Key Authenticated Encryption with Keyword Search
Computer Standards & Interfaces, 2023Lisha Bai +3 more
openaire +1 more source

