Results 241 to 250 of about 10,571 (279)
Some of the next articles are maybe not open access.

Public-Key Encryption with Keyword Search from Lattice

2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2013
Public-keyword encryption with keyword search (PEKS) is a newly emerged primitive which can provide data search functionality that is absent in traditional public-key encryption (PKE). In this work, we propose the first provably secure PEKS from lattice.
Changjiang Hou   +3 more
openaire   +1 more source

Public Key Encryption with Multi-keyword Search

2012
Since the notion of Public-Key Encryption with Keyword Search (PEKS) scheme was proposed, many revisions and extensions have been given. Public-Key Encryption with Multi-Keyword Search(PEMKS) is one of these extensions, which means that the receiver could query subset keywords of all the keywords embedded in the ciphertext.
Chengyu Hu, Peng He, Pengtao Liu
openaire   +1 more source

Revocable Public Key Encryption with Authorized Keyword Search

2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2019
In this paper, we propose a revocable public key encryption with authorized keyword search (RPEAKS) scheme. In RPEAKS, data and keywords are encrypted with one public key, users without corresponding private key need authorization from the manager if they want to search through the ciphertexts.
Wujing xu   +3 more
openaire   +1 more source

Public Key Encryption with Distributed Keyword Search

2016
In this paper we introduce Threshold Public Key Encryption with Keyword Search TPEKS, a variant of PEKS where the search procedure for encrypted keywords is distributed across multiple servers in a threshold manner. TPEKS schemes offer stronger privacy protection for keywords in comparison to traditional PEKS schemes.
Kuchta, Veronika, Manulis, Mark
openaire   +1 more source

A new public key encryption with temporary keyword search

2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering, 2010
The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh et al enables one to search encrypted keywords without compromising the security of the original data. In Joonsang's paper, they proposed a important issue of refreshing keyword in PEKS.
null Guo Duntao   +3 more
openaire   +1 more source

Public key encryption with conjunctive keyword search on lattice

Journal of Information Security and Applications, 2020
Abstract Outsourcing data in cloud storage is gaining popularity recently. For protecting data privacy, the data should be encrypted, and it is thus critical to provide search services for encrypted outsourced data. However, it becomes a problem about how to retrieve encrypted data while protecting data privacy at the same time. Therefore, public key
Peng Wang   +3 more
openaire   +1 more source

Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption

2007
In this paper, we study the problem of secure integrating public key encryption with keyword search (PEKS) with public key data encryption (PKE). We argue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random oracle model.
Rui Zhang, Hideki Imai
openaire   +1 more source

Public Key Encryption with Conjunctive Field Keyword Search

2005
In a public key encryption, we may want to enable someone to test whether something is a keyword in a given document without leaking anything else about the document. An email gateway, for example, may be desired to test whether the email contains a keyword “urgent” so that it could route the email accordingly, without leaking any content to the ...
Park, DJ, Kim, K, Lee, PJ
openaire   +2 more sources

Public key encryption with keyword search based on factoring

2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, 2012
Public key encryption with keyword search (PKES) enables senders to send encrypted data to a Freceiver like traditional public key encryption (PKE) schemes. The difference between PKES and PKE is that the receiver in PKES can search on the encrypted data which is stored on the third-party server (like a cloud storage server). As far as we know, most of
Wenjun Luo, Jianming Tan
openaire   +1 more source

The Public Verifiability of Public Key Encryption with Keyword Search

2018
Cloud computing has been widely recognized as the next big thing in this era. Users outsourced data to cloud server and cloud server provided service economic savings and various convenience for users. Public key encryption with keyword search (PEKS) which provides a solution for a third party user to search on remote data encrypted by data owner ...
Binrui Zhu   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy