A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2023; you can also visit the original URL.
The file type is application/pdf
.
Filters
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security
2023
Information
As a variant of PEKS, certificateless public key authenticated encryption with keyword search (CLPAEKS) not only simplifies certificate management but also could resist keyword guessing attacks (KGA). ...
Public key encryption with keyword search (PEKS) is an important cryptographic primitive as it provides the ability to search for the desired files among ciphertexts. ...
Huang and Li [9] proposed the first public key authenticated encryption with keyword search (PAEKS) scheme, which is similar to signcrpytion [10] . ...
doi:10.3390/info14030142
fatcat:aopic4ej4rbxljvdcayrotlxke
Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey
2016
International Journal of Computer Applications
In searchable encryption scheme [112] , the encryption for index is done by using 1) For every keyword, token is given for the encrypted files that contain keyword pointers that is retrieved and ...
and consistency of data stored. ] propose a lightweight encryption algorithm and a security handshaking protocol for mobile devices and data security is achieved from client side before it is sent to ...
Homomorphic authenticator along with random masking based public key to achieve privacy. ...
doi:10.5120/ijca2016912513
fatcat:y2hdci4lkrhkpfwbnykkibvhqi
A Survey & Analysis of Various Trust Model for Security in Cloud Computing: Issues & Challenges
2017
International Journal of Scientific and Engineering Research
This paper deals with the analysis and survey of all the techniques implemented for Cloud Security so that on the basis of various issues a new and efficient Trust Model is implemented in Future. ...
So for the security of Data Sharing or Resources Allocation various Trust Models are implemented which provides security from various attacks. ...
Infrastruc The main goal of this paper is to provide stronger security by encrypting the file with differential privilege keys. ...
doi:10.14299/ijser.2017.07.004
fatcat:iz765t6w6zaepmqpuhjulkxmam
A Review of Functional Encryption in IoT Applications
2022
Sensors
Functional encryption is an exciting new paradigm of public-key encryption that supports fine-grained access control, generalizing a range of existing fine-grained access control mechanisms. ...
The Internet of Things (IoT) represents a growing aspect of how entities, including humans and organizations, are likely to connect with others in their public and private interactions. ...
Furthermore, traditional public-key encryption with keyword search (PEKS) schemes involve public-key infrastructure (PKI) to authenticate users over the network which is considered a complex and costly ...
doi:10.3390/s22197567
pmid:36236664
pmcid:PMC9573314
fatcat:slcetffyzzfffdq4gav72yvfly
Secure Data Sharing and Customized Services for Intelligent Transportation Based on a Consortium Blockchain
2020
IEEE Access
The ciphertext-policy attribute-based proxy re-encryption algorithm has the function of keyword searching by dividing the key into an attribute key and a search key, which not only solves the problem that ...
She was a Visiting Scholar with the ...
c: THE SECURITY OF KEYWORDS The authentication code y j = e(g, g) bs • e(g, H 3 (kw j )) s is the result of encrypting the keyword kw j . ...
doi:10.1109/access.2020.2981945
fatcat:kkqjqbbphzgcdeshteeuzzvnli
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability
2022
Journal of Cloud Computing: Advances, Systems and Applications
In 2004, Boneh et al. proposed the first public-key searchable encryption scheme which allows users to search by the private key. ...
In this paper, we construct a secure designated server public-key searchable encryption based on Diffie-Hellman problem. ...
[4] introduced a new security concept of authenticated encryption with keyword search (PAEKS) to resist the inside KGA. ...
doi:10.1186/s13677-022-00287-5
fatcat:rj44kpptmvewlg5nbw572qinny
Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks
2018
IEEE Transactions on Industrial Informatics
Searchable public-key encryption (SPE) is a promising method to address this problem. ...
In theory, it allows sensors to upload public-key ciphertexts to the cloud, and the owner of these sensors can securely delegate a keyword search to the cloud and retrieve the intended data while maintaining ...
[24] , and it is called public-key encryption with keyword search (PEKS). ...
doi:10.1109/tii.2017.2784395
fatcat:untiuzkq4zfjvpm6fpcz2fp2iu
Generic Construction of Dual-Server Public Key Encryption with Keyword Search on Cloud Computing
2020
IEEE Access
Finally, we analyze the newly proposed DS-PEKS scheme, and proof its security with the stronger models based on the IND-CCA2 security in the standard model. ...
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes. ...
[18, 19] proposed the first dual-server public key encryption with keyword search (DS-PEKS) to deal with the inner keyword guessing attacks. ...
doi:10.1109/access.2020.3017745
fatcat:2s3yxlnuubgrlaorr7gpmrppy4
Removing Escrow from Identity-Based Encryption
[chapter]
2009
Lecture Notes in Computer Science
Key escrow is inherent in identity-based encryption (IBE). A curious key generation center (KGC) can simply generate the user's private key to decrypt a ciphertext. ...
Second, we propose a new system architecture with an anonymous private key generation protocol such that the KGC can issue a private key to an authenticated user without knowing the list of users identities ...
We propose a new system architecture with an anonymous key issuing (AKI) protocol to protect the confidentiality of the users identities. ...
doi:10.1007/978-3-642-00468-1_15
fatcat:y3w6wwgdmrfbvhncy3rd3ecy7a
Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications
2019
IEEE Access
Researchers from various fields are attempting to achieve data security. ...
SSE allows users to use keywords to search for data in an untrusted cloud server but the keywords and the data content are concealed from the server. ...
Ma et al. designed an IoT public key encryption scheme that supports multiple keywords. This scheme supports database search, which does not require a secure network channel and is certificateless. ...
doi:10.1109/access.2019.2961971
fatcat:7ufxddylkzgjdlw425ebedcz5a
Certificateless Designated Verifier Proxy Signature
[article]
2021
IACR Cryptology ePrint Archive
Keywords: certificateless public-key cryptography; designated verifier proxy signature; certificateless designated verifier proxy signature; random oracle model; provable security; bilinear pairings. the ...
Digital signature schemes allow any signer to sign a message using its private key in such a way that any other (i.e., verifier) who has an authentic copy of the public key associated with the signer can ...
public key of any user with his choice but cannot access to the master secret key ...
dblp:journals/iacr/Kim21a
fatcat:32phfcjz6jbwllvnb6po3sqeaa
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation
2017
Journal of Network and Computer Applications
Proxy re-encryption is a special type of public-key encryption that permits a proxy to transform ciphertexts from one public key to another, without the proxy being able to learn any information about ...
Finally, we discuss some applications of proxy re-encryption, with a focus on secure access delegation in the cloud. ...
In conditional PRE, re-encryption keys are associated to a certain keyword, so the proxy is only capable of re-encrypting ciphertexts that are tagged with that keyword. ...
doi:10.1016/j.jnca.2017.03.005
fatcat:wlmfwffpwffnjhkopjuwg4yqfe
A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives
2017
Security and Communication Networks
This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. ...
Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations ...
The private key-public key pair is used to encrypt and decrypt a message. If the private key is used to encrypt the message, then the message must be decrypted using the public key. ...
doi:10.1155/2017/2057260
fatcat:xbybwhsoqnappf6xotoxo3b4eq
Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model
2020
Security and Communication Networks
Based on the certificate-based key encapsulation scheme, a novel certificate-based encryption scheme is proposed, which is resilient to the continual leakage. ...
The security for many certificate-based encryption schemes was considered under the ideal condition, where the attackers rarely have the secret state for the solutions. ...
To construct CBE scheme with stronger leakage-resilient property (such as auxiliary inputs, postchallenge leakage, etc.) and leakage-resilient certificateless encryption scheme with keyword search [51 ...
doi:10.1155/2020/1492681
fatcat:lrymlnshebh7zcngj3zwxr2d5m
Anonymous Certificate-Based Inner Product Broadcast Encryption
2021
Security and Communication Networks
Security proofs show that the proposed scheme achieves confidentiality and anonymity against adaptive chosen-ciphertext attacks. ...
Second, compared with the existing inner product broadcast encryption schemes, the proposed scheme has an advantage of anonymity. ...
[24] proposed a keyword search identity-based broadcast encryption against insider attacks for cloud database systems. ...
doi:10.1155/2021/6639835
fatcat:n4ynotwh3jbttmukschvbulmle
« Previous
Showing results 1 — 15 out of 33 results