With a further exploration of modern cryptography, people realize that Public Key Infrastructure (PKI) is not perfect but has its limitations. One of the limitations is that PKI completely depends on the Certification Authority (CA) to obtain a digital certificate, but this online trusted third party might be compromised by the cyber attacks. Therefore, Shamir proposed a definition of Identity Based Encryption (IBE) which only relies on user’s identity to generate the public key instead of CA. Although the blueprint of IBE was presented in 1984, the first secure and reliable IBE system has been introduced until 2001. Meanwhile, some applications of IBE, such as Public Key Encryption with Keyword Search (PEKS), have been came up with since t...
Cloud storage and computing offers significant convenience and management efficiency in the informat...
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over cip...
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key $T_W$ to a ...
Public Key Encryption with Keyword Search (PEKS) enables users to search encrypted messages by a spe...
Public Key Encryption with Keyword Search (PEKS) allows users to search encrypted files by a specifi...
The public cloud environment has attracted massive attackers to exploit insecure ports and access to...
[[abstract]]The idea of public key encryption with keyword search (PEKS), proposed by Boneh et al., ...
[[abstract]]Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypt...
How to efficiently search over encrypted data is an important and interesting problem in the cloud e...
Public-key encryption with keyword search (PEKS) is a versatile tool. It allows a third party knowin...
1. Public Key Encryption with Keyword Search (PEKS) • The concept was introduced by Boneh et al. (2...
Public-key Authenticated Encryption with Keyword Search (PAEKS) is a cryptographic primitive that ca...
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplif...
doi:10.4156/jdcta.vol4. issue9.17 A public key encryption with keyword search (PEKS) scheme does not...
Network and system security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-...
Cloud storage and computing offers significant convenience and management efficiency in the informat...
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over cip...
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key $T_W$ to a ...
Public Key Encryption with Keyword Search (PEKS) enables users to search encrypted messages by a spe...
Public Key Encryption with Keyword Search (PEKS) allows users to search encrypted files by a specifi...
The public cloud environment has attracted massive attackers to exploit insecure ports and access to...
[[abstract]]The idea of public key encryption with keyword search (PEKS), proposed by Boneh et al., ...
[[abstract]]Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypt...
How to efficiently search over encrypted data is an important and interesting problem in the cloud e...
Public-key encryption with keyword search (PEKS) is a versatile tool. It allows a third party knowin...
1. Public Key Encryption with Keyword Search (PEKS) • The concept was introduced by Boneh et al. (2...
Public-key Authenticated Encryption with Keyword Search (PAEKS) is a cryptographic primitive that ca...
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplif...
doi:10.4156/jdcta.vol4. issue9.17 A public key encryption with keyword search (PEKS) scheme does not...
Network and system security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-...
Cloud storage and computing offers significant convenience and management efficiency in the informat...
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over cip...
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key $T_W$ to a ...