Abstract — A Public Key Encryption is a technique of encrypting the message using public keys so that the message is secure against various attacks. A Keyword based Public Key Encryption is a new way of providing security against various attacks. Although there are various keyword searches based public key encryption techniques are implemented. Here in this paper a survey of all the techniques based on Keyword search based public key encryption is analyzed and describes here, so that on the basis of their various advantages and limitations a new and efficient technique is implemented in future
Searchable encryption mechanism and attribute-based encryption (ABE) are two effective tools for pro...
doi:10.4156/jdcta.vol4. issue9.17 A public key encryption with keyword search (PEKS) scheme does not...
The public cloud environment has attracted massive attackers to exploit insecure ports and access to...
1. Public Key Encryption with Keyword Search (PEKS) • The concept was introduced by Boneh et al. (2...
We study the problem of searching on data that is encrypted using a public key system. Consider user...
[[abstract]]Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypt...
Abstract: Public key cryptography refers to a cryptographic system requiring two separate keys, one ...
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over cip...
Prior to outsourcing sensitive data, users need to encrypt the data and outsource the ciphertexts to...
Public-key Encryption with Keyword Search (PEKS), proposed by Boneh et al. in 2004, is a cryptograph...
Certificateless Public-key Authenticated Encryption with Keyword Search (CLPAEKS) is derived from th...
Public-key Authenticated Encryption with Keyword Search (PAEKS) is a cryptographic primitive that ca...
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplif...
With the development of cryptography, the attribute-based encryption (ABE) draws widespread attentio...
A method of encrypting messages is presented in this paper which has several advantages over convent...
Searchable encryption mechanism and attribute-based encryption (ABE) are two effective tools for pro...
doi:10.4156/jdcta.vol4. issue9.17 A public key encryption with keyword search (PEKS) scheme does not...
The public cloud environment has attracted massive attackers to exploit insecure ports and access to...
1. Public Key Encryption with Keyword Search (PEKS) • The concept was introduced by Boneh et al. (2...
We study the problem of searching on data that is encrypted using a public key system. Consider user...
[[abstract]]Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypt...
Abstract: Public key cryptography refers to a cryptographic system requiring two separate keys, one ...
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over cip...
Prior to outsourcing sensitive data, users need to encrypt the data and outsource the ciphertexts to...
Public-key Encryption with Keyword Search (PEKS), proposed by Boneh et al. in 2004, is a cryptograph...
Certificateless Public-key Authenticated Encryption with Keyword Search (CLPAEKS) is derived from th...
Public-key Authenticated Encryption with Keyword Search (PAEKS) is a cryptographic primitive that ca...
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplif...
With the development of cryptography, the attribute-based encryption (ABE) draws widespread attentio...
A method of encrypting messages is presented in this paper which has several advantages over convent...
Searchable encryption mechanism and attribute-based encryption (ABE) are two effective tools for pro...
doi:10.4156/jdcta.vol4. issue9.17 A public key encryption with keyword search (PEKS) scheme does not...
The public cloud environment has attracted massive attackers to exploit insecure ports and access to...