2013
DOI: 10.1016/j.ins.2013.03.008
|View full text |Cite
|
Sign up to set email alerts
|

Public key encryption with keyword search secure against keyword guessing attacks without random oracle

Abstract: . Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Information Sciences, 238 221-241.Public key encryption with keyword search secure against keyword guessing attacks without random oracle AbstractThe notion of public key encryption with keyword search (PEKS) was put forth by Boneh et al. to enable a server to search from a collection of encrypted emails given a "trapdoor" (i.e., an encrypted keyword) provided by the receiver. The nice property in this sc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
87
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 186 publications
(87 citation statements)
references
References 32 publications
(77 reference statements)
0
87
0
Order By: Relevance
“…For this reason, the search pattern is also leaked in searchable asymmetric encryption (a.k.a. public key encryption with keyword search, PEKS), whose query algorithms are probabilistic [8,6,20,12]. Therefore, randomizing query algorithm only contributes to defend outer adversaries but not inner adversaries (e.g., cloud administrators).…”
Section: Introductionmentioning
confidence: 99%
“…For this reason, the search pattern is also leaked in searchable asymmetric encryption (a.k.a. public key encryption with keyword search, PEKS), whose query algorithms are probabilistic [8,6,20,12]. Therefore, randomizing query algorithm only contributes to defend outer adversaries but not inner adversaries (e.g., cloud administrators).…”
Section: Introductionmentioning
confidence: 99%
“…In addition, works done to support single keyword search [11], [13], multi-keyword search and ranking [3], [14], [15], subset query and range query [16], [17] and fuzzy multi-keyword search [18], [19]. Most of the previous work done on SE to improve secrecy motivated by adversary activity [20], [21]. Some adversary activities include brute force attack [20], search/access pattern leakage [8], [21] and DDoS attack [5].…”
Section: Searchable Encryption (Se)mentioning
confidence: 99%
“…Most of the previous work done on SE to improve secrecy motivated by adversary activity [20], [21]. Some adversary activities include brute force attack [20], search/access pattern leakage [8], [21] and DDoS attack [5]. To proof that any scheme or algorithm developed was resistant enough from attacks or adversary activities, system model and threat model were constructed for experimental purposes [3], [14].…”
Section: Searchable Encryption (Se)mentioning
confidence: 99%
“…In the year 2013 [7], Fang et al proposed SCF-PEKS proposal without random oracle. In this scheme, the receiver is chosen by the server(designated tester) which can perform a test to verify the relationship between cipher text and trapdoor.…”
Section: Literature Surveymentioning
confidence: 99%