2020
DOI: 10.1007/s10207-020-00524-5
|View full text |Cite
|
Sign up to set email alerts
|

Password-authenticated searchable encryption

Abstract: We introduce Password Authenticated Searchable Encryption (PASE), a novel searchable encryption scheme where a single human-memorizable password can be used to outsource (encrypted) data with associated keywords to a group of servers and later retrieve this data through the encrypted keyword search procedure. PASE ensures that only the legitimate user who knows the initially registered password can perform these operations. In particular, PASE guarantees that no single server can mount an offline attack on the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 38 publications
0
12
0
Order By: Relevance
“…Chen et al 28 The communication cost illustrates trapdoor and cipher-text of linear size with respect to number of keywords attached in a query set and number of keywords attached in a cipher-text, respectively. The proposed protocol incorporates minimal overhead in trapdoor and cipher-text sizes independent of overall keywords attached with cipher-text and in the query set.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…Chen et al 28 The communication cost illustrates trapdoor and cipher-text of linear size with respect to number of keywords attached in a query set and number of keywords attached in a cipher-text, respectively. The proposed protocol incorporates minimal overhead in trapdoor and cipher-text sizes independent of overall keywords attached with cipher-text and in the query set.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…To demonstrate the performance and efficiency, we evaluate storage space, communication and computation costs of the proposed protocol with similar modeled schemes of References 8,16,21,23,28,31 and 33 in Table 3. The storage cost illustrates constant size of aggregate key, trapdoor, and keyword cipher‐texts by utilizing PKBE protocol 36 and key‐aggregation method 8 .…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Chen et al (2020) [25] incorporated the search mechanism with a memorable user password. Although this method was proven computationally efficient concerning key management, it increased the design overhead while creating a distributed architecture to prevent dictionary attacks.…”
Section: Secure Searchable Encryptionmentioning
confidence: 99%
“…Step 1: Users carry their own identity information ID i and password PW i and select random r i to carry out password encryption and identity information encryption calculation [33]. e results are as follows:…”
Section: Internet Of Things Key Update Based On Smart Contractmentioning
confidence: 99%