A new general framework for secure public key encryption with keyword search
From MaRDI portal
Publication:3194589
DOI10.1007/978-3-319-19962-7_4zbMATH Open1358.94060OpenAlexW1573743738MaRDI QIDQ3194589FDOQ3194589
Authors: Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang
Publication date: 20 October 2015
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-19962-7_4
Recommendations
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
- Efficient Public Key Encryption with Keyword Search Schemes from Pairings
- Perfect keyword privacy in PEKS systems
- On security against the server in designated tester public key encryption with keyword search
Cites Work
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Round-optimal privacy-preserving protocols with smooth projective hash functions
- Smooth Projective Hashing for Conditionally Extractable Commitments
- Smooth projective hashing and two-message oblivious transfer
- Title not available (Why is that?)
- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search
- Round-optimal password-based authenticated key exchange
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
- New techniques for SPHFs and efficient one-round PAKE protocols
- SPHF-friendly non-interactive commitments
- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
- Public Key Encryption with Keyword Search Based on K-Resilient IBE
Cited In (25)
- Public key encryption with distributed keyword search
- Security-enhanced public-key authenticated searchable encryption
- Public Key Encryption with Keyword Search Based on K-Resilient IBE
- An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
- Novel identity-based hash proof system with compact master public key from lattices in the standard model
- Perfect keyword privacy in PEKS systems
- One-round strong oblivious signature-based envelope
- An ElGamal-like secure channel free public key encryption with keyword search scheme
- Secure-channel free certificateless searchable public key authenticated encryption with keyword search
- Title not available (Why is that?)
- Efficient Public Key Encryption with Keyword Search Schemes from Pairings
- An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
- Forward and backward secure keyword search with flexible keyword shielding
- Key-updatable public-key encryption with keyword search: models and generic constructions
- Public key encryption with temporary and fuzzy keyword search
- A novel model for lattice-based authorized searchable encryption with special keyword
- Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
- Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions
- An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
- On security against the server in designated tester public key encryption with keyword search
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Witness-based searchable encryption
- Identity-based encryption with outsourced equality test in cloud computing
- Group public key encryption with equality test against offline message recovery attack
- Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
This page was built for publication: A new general framework for secure public key encryption with keyword search
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3194589)