Public key encryption with keyword search (PEKS) enables user Alice to send a secret key $T_W$ to a server that will enable the server to locate all encrypted messages containing the keyword $W$, but learn nothing else. In this paper, we propose a new PKES scheme based on pairings. There is no pairing operation involved in the encryption procedure. Then, we provide further discussion on removing secure channel from PKES, and present an efficient secure channel free PKES scheme. Our two new schemes can be proved secure in the random oracle model, under the appropriate computational assumptions
Cloud storage and computing offers significant convenience and management efficiency in the informat...
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over cip...
With a further exploration of modern cryptography, people realize that Public Key Infrastructure (PK...
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key T_W to a se...
doi:10.4156/jdcta.vol4. issue9.17 A public key encryption with keyword search (PEKS) scheme does not...
Public Key Encryption with Keyword Search (PEKS) enables users to search encrypted messages by a spe...
[[abstract]]Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypt...
Public key Encryption with Keyword Search (PEKS) aims in mitigating the impacts of data privacy vers...
1. Public Key Encryption with Keyword Search (PEKS) • The concept was introduced by Boneh et al. (2...
[[abstract]]The idea of public key encryption with keyword search (PEKS), proposed by Boneh et al., ...
How to efficiently search over encrypted data is an important and interesting problem in the cloud e...
Public-key encryption with keyword search (PEKS) allows a sender to generate keyword-searchable ciph...
Network and system security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-...
At SeCrypt 2015, Buccafurri et al. [BLSS15] presented an integrated public-key encryption (PKE) and ...
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encr...
Cloud storage and computing offers significant convenience and management efficiency in the informat...
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over cip...
With a further exploration of modern cryptography, people realize that Public Key Infrastructure (PK...
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key T_W to a se...
doi:10.4156/jdcta.vol4. issue9.17 A public key encryption with keyword search (PEKS) scheme does not...
Public Key Encryption with Keyword Search (PEKS) enables users to search encrypted messages by a spe...
[[abstract]]Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypt...
Public key Encryption with Keyword Search (PEKS) aims in mitigating the impacts of data privacy vers...
1. Public Key Encryption with Keyword Search (PEKS) • The concept was introduced by Boneh et al. (2...
[[abstract]]The idea of public key encryption with keyword search (PEKS), proposed by Boneh et al., ...
How to efficiently search over encrypted data is an important and interesting problem in the cloud e...
Public-key encryption with keyword search (PEKS) allows a sender to generate keyword-searchable ciph...
Network and system security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-...
At SeCrypt 2015, Buccafurri et al. [BLSS15] presented an integrated public-key encryption (PKE) and ...
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encr...
Cloud storage and computing offers significant convenience and management efficiency in the informat...
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over cip...
With a further exploration of modern cryptography, people realize that Public Key Infrastructure (PK...