The invention discloses a public-key searchable encryption method supporting multi-secret-key encryption based on a designated server. By means of the public-key searchable encryption method, the function of search through the designated server can be achieved, different file secret keys are used ...
Searchable encryption, which allows one to search over encrypted data, has recently become an important research direction in cryptography. According to the key generation algorithm, searchable encryption can be divided into two categories, which are referred to as secret-key setting and public-key se...
Chengyu Hu,Pengtao Liu.An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its Extensions[J]. Journal of Computers .2012(3)Hu, C. and Liu, P.: An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its Ex- tensions. Journal of Computers...
In searchable encryption, the security goal is that the ciphertexts and trapdoors leak no information about keywords. So far, there is rarely public-key searchable encryption schemes achieve both MCI and MTP, and security against KGA. In this paper, our goal is to construct an enhanced secure ...
We study the problem of a public key encryption with conjunctive keyword search (PECK). The keyword searchable encryption enables a user to outsource his data to the storage of an untrusted server and to have the ability to selectively search his data wi
proposed an efficient public key encryption scheme with keyword search based on the scheme of Boneh et al., However, the security model of Baek et al. seriously limits the ability of the adversary. In this paper, we enhance the security model of the public key encryption with keyword search...
Public key encryption with keyword search (PKES) enables senders to send encrypted data to a Freceiver like traditional public key encryption (PKE) schemes. The difference between PKES and PKE is that the receiver in PKES can search on the encrypted data which is stored on the third-party ser...
Navigating the complex realm of secure cloud storage, our application offers a uniquely robust and user-friendly data storage solution, adeptly bridging AES-256 encryption and public key searchable encryption to safeguard user data while maintaining accessible retrieval. Specifically, the Searchable Encrypt...
This scheme uses a DH shared key and is proven to resist KGAs. In the Internet of Things (IoT) environment, Wu et al. [24] proposed a certificateless searchable public key authentication encryption scheme, which can resist KGAs at the same time and also has a higher efficiency. Ma et al...
In this paper, we propose a variant of searchable public-key encryption named hidden-token searchable public-key encryption with two new security properties: token anonymity and one-token-per-trapdoor. With the former security notion, the client can obtain the search token from the data owner wit...