Public Key Encryption with Hierarchical Authorized Keyword Search
Abstract
References
Recommendations
Public-Key encryption from ID-Based encryption without one-time signature
OTM'06: Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part IDesign a secure public key encryption scheme and its security proof are one of the main interests in cryptography In 2004, Canetti, Halevi and Katz [8] constructed a public key encryption (PKE) from a selective identity-based encryption scheme with a ...
Public Key Encryption with Authorized Keyword Search
Proceedings, Part II, of the 21st Australasian Conference on Information Security and Privacy - Volume 9723Public key encryption with keyword search PEKS provides an elegant mechanism for a user to identify the specific encrypted data. PEKS protects data against disclosure while making it searchable. In this paper, we propose a new cryptographic primitive ...
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Information Security and CryptologyPublic key encryption with keyword search (PEKS) scheme to enable one to search encrypted keywords without compromising the security of the original data. In this paper, we propose a new PEKS scheme based on bilinear pairings. The scheme is ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in