Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








33 Hits in 4.5 sec

Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security

Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang
2023 Information  
As a variant of PEKS, certificateless public key authenticated encryption with keyword search (CLPAEKS) not only simplifies certificate management but also could resist keyword guessing attacks (KGA).  ...  Public key encryption with keyword search (PEKS) is an important cryptographic primitive as it provides the ability to search for the desired files among ciphertexts.  ...  Huang and Li [9] proposed the first public key authenticated encryption with keyword search (PAEKS) scheme, which is similar to signcrpytion [10] .  ... 
doi:10.3390/info14030142 fatcat:aopic4ej4rbxljvdcayrotlxke

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

Jeevitha B., Thriveni J., Venugopal K.
2016 International Journal of Computer Applications  
In searchable encryption scheme [112] , the encryption for index is done by using 1) For every keyword, token is given for the encrypted files that contain keyword pointers that is retrieved and  ...  and consistency of data stored. ] propose a lightweight encryption algorithm and a security handshaking protocol for mobile devices and data security is achieved from client side before it is sent to  ...  Homomorphic authenticator along with random masking based public key to achieve privacy.  ... 
doi:10.5120/ijca2016912513 fatcat:y2hdci4lkrhkpfwbnykkibvhqi

A Survey & Analysis of Various Trust Model for Security in Cloud Computing: Issues & Challenges

Mr.Ashish Sharma, Dr.Sanjay Kumar
2017 International Journal of Scientific and Engineering Research  
This paper deals with the analysis and survey of all the techniques implemented for Cloud Security so that on the basis of various issues a new and efficient Trust Model is implemented in Future.  ...  So for the security of Data Sharing or Resources Allocation various Trust Models are implemented which provides security from various attacks.  ...  Infrastruc The main goal of this paper is to provide stronger security by encrypting the file with differential privilege keys.  ... 
doi:10.14299/ijser.2017.07.004 fatcat:iz765t6w6zaepmqpuhjulkxmam

A Review of Functional Encryption in IoT Applications

Khurram Shahzad, Tanveer Zia, Emad-ul-Haq Qazi
2022 Sensors  
Functional encryption is an exciting new paradigm of public-key encryption that supports fine-grained access control, generalizing a range of existing fine-grained access control mechanisms.  ...  The Internet of Things (IoT) represents a growing aspect of how entities, including humans and organizations, are likely to connect with others in their public and private interactions.  ...  Furthermore, traditional public-key encryption with keyword search (PEKS) schemes involve public-key infrastructure (PKI) to authenticate users over the network which is considered a complex and costly  ... 
doi:10.3390/s22197567 pmid:36236664 pmcid:PMC9573314 fatcat:slcetffyzzfffdq4gav72yvfly

Secure Data Sharing and Customized Services for Intelligent Transportation Based on a Consortium Blockchain

Di Wang, Xiaohong Zhang
2020 IEEE Access  
The ciphertext-policy attribute-based proxy re-encryption algorithm has the function of keyword searching by dividing the key into an attribute key and a search key, which not only solves the problem that  ...  She was a Visiting Scholar with the  ...  c: THE SECURITY OF KEYWORDS The authentication code y j = e(g, g) bs • e(g, H 3 (kw j )) s is the result of encrypting the keyword kw j .  ... 
doi:10.1109/access.2020.2981945 fatcat:kkqjqbbphzgcdeshteeuzzvnli

An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability

Junling Guo, Lidong Han, Guang Yang, Xuejiao Liu, Chengliang Tian
2022 Journal of Cloud Computing: Advances, Systems and Applications  
In 2004, Boneh et al. proposed the first public-key searchable encryption scheme which allows users to search by the private key.  ...  In this paper, we construct a secure designated server public-key searchable encryption based on Diffie-Hellman problem.  ...  [4] introduced a new security concept of authenticated encryption with keyword search (PAEKS) to resist the inside KGA.  ... 
doi:10.1186/s13677-022-00287-5 fatcat:rj44kpptmvewlg5nbw572qinny

Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks

Peng Xu, Shuanghong He, Wei Wang, Willy Susilo, Hai Jin
2018 IEEE Transactions on Industrial Informatics  
Searchable public-key encryption (SPE) is a promising method to address this problem.  ...  In theory, it allows sensors to upload public-key ciphertexts to the cloud, and the owner of these sensors can securely delegate a keyword search to the cloud and retrieve the intended data while maintaining  ...  [24] , and it is called public-key encryption with keyword search (PEKS).  ... 
doi:10.1109/tii.2017.2784395 fatcat:untiuzkq4zfjvpm6fpcz2fp2iu

Generic Construction of Dual-Server Public Key Encryption with Keyword Search on Cloud Computing

Raylin Tso, Kaibin Huang, Yu-Chi Chen, Sk Md Mizanur Rahman, Tsu-Yang Wu
2020 IEEE Access  
Finally, we analyze the newly proposed DS-PEKS scheme, and proof its security with the stronger models based on the IND-CCA2 security in the standard model.  ...  Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.  ...  [18, 19] proposed the first dual-server public key encryption with keyword search (DS-PEKS) to deal with the inner keyword guessing attacks.  ... 
doi:10.1109/access.2020.3017745 fatcat:2s3yxlnuubgrlaorr7gpmrppy4

Removing Escrow from Identity-Based Encryption [chapter]

Sherman S. M. Chow
2009 Lecture Notes in Computer Science  
Key escrow is inherent in identity-based encryption (IBE). A curious key generation center (KGC) can simply generate the user's private key to decrypt a ciphertext.  ...  Second, we propose a new system architecture with an anonymous private key generation protocol such that the KGC can issue a private key to an authenticated user without knowing the list of users identities  ...  We propose a new system architecture with an anonymous key issuing (AKI) protocol to protect the confidentiality of the users identities.  ... 
doi:10.1007/978-3-642-00468-1_15 fatcat:y3w6wwgdmrfbvhncy3rd3ecy7a

Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications

Yen-Wu Ti, Chia-Feng Wu, Chia-Mu Yu, Sy-Yen Kuo
2019 IEEE Access  
Researchers from various fields are attempting to achieve data security.  ...  SSE allows users to use keywords to search for data in an untrusted cloud server but the keywords and the data content are concealed from the server.  ...  Ma et al. designed an IoT public key encryption scheme that supports multiple keywords. This scheme supports database search, which does not require a secure network channel and is certificateless.  ... 
doi:10.1109/access.2019.2961971 fatcat:7ufxddylkzgjdlw425ebedcz5a

Certificateless Designated Verifier Proxy Signature [article]

Cholun Kim
2021 IACR Cryptology ePrint Archive  
Keywords: certificateless public-key cryptography; designated verifier proxy signature; certificateless designated verifier proxy signature; random oracle model; provable security; bilinear pairings. the  ...  Digital signature schemes allow any signer to sign a message using its private key in such a way that any other (i.e., verifier) who has an authentic copy of the public key associated with the signer can  ...  public key of any user with his choice but cannot access to the master secret key  ... 
dblp:journals/iacr/Kim21a fatcat:32phfcjz6jbwllvnb6po3sqeaa

Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation

David Nuñez, Isaac Agudo, Javier Lopez
2017 Journal of Network and Computer Applications  
Proxy re-encryption is a special type of public-key encryption that permits a proxy to transform ciphertexts from one public key to another, without the proxy being able to learn any information about  ...  Finally, we discuss some applications of proxy re-encryption, with a focus on secure access delegation in the cloud.  ...  In conditional PRE, re-encryption keys are associated to a certain keyword, so the proxy is only capable of re-encrypting ciphertexts that are tagged with that keyword.  ... 
doi:10.1016/j.jnca.2017.03.005 fatcat:wlmfwffpwffnjhkopjuwg4yqfe

A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

Chalee Vorakulpipat, Soontorn Sirapaisan, Ekkachan Rattanalerdnusorn, Visut Savangsuk
2017 Security and Communication Networks  
This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD.  ...  Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations  ...  The private key-public key pair is used to encrypt and decrypt a message. If the private key is used to encrypt the message, then the message must be decrypted using the public key.  ... 
doi:10.1155/2017/2057260 fatcat:xbybwhsoqnappf6xotoxo3b4eq

Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model

Yuyan Guo, Jiguo Li, Mingming Jiang, Lei Yu, Shimin Wei
2020 Security and Communication Networks  
Based on the certificate-based key encapsulation scheme, a novel certificate-based encryption scheme is proposed, which is resilient to the continual leakage.  ...  The security for many certificate-based encryption schemes was considered under the ideal condition, where the attackers rarely have the secret state for the solutions.  ...  To construct CBE scheme with stronger leakage-resilient property (such as auxiliary inputs, postchallenge leakage, etc.) and leakage-resilient certificateless encryption scheme with keyword search [51  ... 
doi:10.1155/2020/1492681 fatcat:lrymlnshebh7zcngj3zwxr2d5m

Anonymous Certificate-Based Inner Product Broadcast Encryption

Shuang Yao, Dawei Zhang, Leandros Maglaras
2021 Security and Communication Networks  
Security proofs show that the proposed scheme achieves confidentiality and anonymity against adaptive chosen-ciphertext attacks.  ...  Second, compared with the existing inner product broadcast encryption schemes, the proposed scheme has an advantage of anonymity.  ...  [24] proposed a keyword search identity-based broadcast encryption against insider attacks for cloud database systems.  ... 
doi:10.1155/2021/6639835 fatcat:n4ynotwh3jbttmukschvbulmle
« Previous Showing results 1 — 15 out of 33 results