Public key encryption with keyword search secure against keyword guessing attacks without random oracle - Fang, Susilo, et al.FANG L, SUSILO W, GE C, et al. Public key encryption with key- word search secure ag
Searchable encryption allows data user to securely retrieve the encrypted documents of interest through keywords. In general, searchable encryption mainly contains symmetric searchable encryption (SSE) and public key encryption with keyword search (PEKS). In this paper, we mainly discuss the PEKS ...
Public Key Encryption with Keyword Search We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent...
multi-user EMR sharing. To resolve these challenges, we propose a novel lightweight multi-user public-key authenticated encryption scheme with keyword search (LM-PAEKS). Our design effectively counters the inside keyword guessing attack (IKGA) while maintaining the sizes of ciphertext and trapdoor ...
The motivation of public-key authenticated encryption with keyword search (PAEKS) was to resist against inside keyword guessing attacks. Its security model captures both cipher-keyword indistinguishability (CI-security) and trapdoor indistinguishability.
Therefore, public key encryption with keyword search (PEKS) is proposed. Nevertheless, the majority of the existing PEKS schemes are based on bilinear mappings and do not provide quantum security. Although some lattice-based PEKS schemes have been proposed, they cannot support conjunctive keyw...
The present principle relate to new public-key cryptosystems with searchable encryption, in particular, public key encryption with keyword search. Public key encryption with keyword search is a form of encryption that allows searching on data that is encrypted using a public key system. Notably, the...
To solve this problem, public key encryption with keyword search (PEKS) is suggested, which is a widely used method. Addressing this issue separately is beneficial because PEKS does not require a secure communication channel and key distribution. Therefore, at first glance, it seems that PEKS ...
Public-key encryption with keyword search (PEKS), first proposed by Boneh et al. [1], enables arbitrary number of senders to generate and send keyword-searchable ciphertexts to a receiver with the receiver’s public key. The ciphertexts are stored on a semi-honest server. When the receiver ...
Recently, many public key encryption with keyword search (PEKS) schemes have been designed to address the security and privacy of the outsourced data. However, most of the existing schemes support only single-keyword search, and cannot suitable for multi-user environment. To resolve these issues,...