22
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Public key encryption with distributed keyword search

, &
Pages 2369-2393 | Received 01 Apr 2020, Published online: 17 May 2021

References

  • Amos Beimel. Secure schemes for secret sharing and key distribution. Technion-Israel Institute of technology, Faculty of computer science, 1996.
  • D. Boneh and M.: Franklin. Identity-based encryption from the weil pairing. In Proceedings of Annual International Cryptology Conference, pages 213-229. Springer), 2001.
  • Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. Public key encryption with keyword search. In Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, volume 3027, pages 506-522. Springer), 2004.
  • Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, and Xiaofen Wang. A new general framework for secure public key encryption with keyword search. In Proceedings of the Conference on Information Security and Privacy (LNCS), volume 9144, pages 59-76. Springer), 2015.
  • Xi Chen and Yong Li. E cient proxy re-encryption with private keyword searching in untrusted storage. International Journal of Computer Network and Information Security, 3(2):50-56, 2011. doi: 10.5815/ijcnis.2011.02.07
  • Reza Curtmola, Juan Garay, Seny Kamara, and Rafail Ostrovsky. Searchable symmetric encryption:improved definitions and efficient constructions. In Proceedings of 13th conference on Computer and communications security, pages 79-88. ACM), 2006.
  • Shuguang Dai, Huige Li, and Fangguo Zhang. Memory leakage-resilient searchable symmetric encryption. Future Generation Computer Systems, 62:76-84, 2016. doi: 10.1016/j.future.2015.11.003
  • Maozhen Ding, Fei Gao, Zhengping Jin, and Hua Zhang. An efficient public key encryption with conjunctive keyword search scheme based on pairings. In Proceedings of International Conference on Network Infrastructure and Digital Content, pages 526-530. IEEE), 2012.
  • Changyu Dong, Giovanni Russello, and Naranker Dulay. Shared and searchable encrypted data for untrusted servers. In Proceedings of 22nd Conference on Data and Applications Security, pages 127-143. Springer), 2008.
  • Q. Dong, Z. Guan, and Z. Chen. Attribute-based keyword search efficiency enhancement via an online/offlne approach. In Proceedings of 21st International Conference on Parallel and Distributed Systems, pages 298-305. IEEE), 2015.
  • Z Eslami, M Noroozi, and SK Rad. Provably secure group key exchange protocol in the presence of dishonest insiders. International Journal of Network Security, 18(1):33-42, 2016.
  • Liming Fang, Willy Susilo, Chunpeng Ge, and Jiandong Wang. Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Information Sciences, 238(Supplement C):221-241, 2013. doi: 10.1016/j.ins.2013.03.008
  • Wang Baomin He Zhiling and Luo Wenjun. An efficient scheme of multi-user searchable encryption with keyword in cloud storage. In Proceedings of International Workshop on Cloud Computing and Information Security, Atlantis Press. Atlantis Press), 2013.
  • Yong Ho Hwang and Pil Joong Lee. Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Proceedings of International Conference on Pairing-Based Cryptography, pages 2-22. Springer), 2007.
  • Addepalli V. N. Krishna. A big data security mechanism based on fully homomorphic encryption using cubic spline curve public key cryptography. Journal of Information and Optimization Sciences, 39(6):1387-1399, 2018. doi: 10.1080/02522667.2018.1507762
  • Sun-Ho Lee and Im-Yeong Lee. Secure index management scheme on cloud storage environment. International Journal of Security and Its Applications, 6(3):75-82, 2012.
  • Zhen Li, Minghao Zhao, Han Jiang, and Qiuliang Xu. Multi-user searchable encryption with a designated server. Annals of Telecommunications, 72(9-10):617-629, 2017. doi: 10.1007/s12243-017-0571-x
  • Chang Liu, Liehuang Zhu, and Jinjun Chen. Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud. Journal of Network and Computer Applications, 86:3-14, 2017. doi: 10.1016/j.jnca.2016.09.010
  • S. Liu, K. Chen, and W. Qiu. Identity-based threshold decryption revisited. In Proceedings of International Conference on Information Security Practice and Experience, volume 4464, pages 329-343. Springer), 2007.
  • Z. Liu, Z. Wang, X. Cheng, C. Jia, and K. Yuan. Multi-user searchable encryption with coarser-grained access control in hybrid cloud. In Proceedings of Fourth International Conference on Emerging Intelligent Data and Web Technologies, pages 249-255. IEEE), 2013.
  • Y Lu and J Li. Efficient searchable public key encryption against keyword guessing attacks for cloud-based emr systems. Cluster Computing, 22(1):285-299, 2019. doi: 10.1007/s10586-018-2855-y
  • B Lynn. Pbc library: the pairing-based cryptography library. http://cryptostanfordedu/pbc, page Accessed 1 April 2014, 2013.
  • Chandrashekhar Meshram and Xiangxue Li. New efficient key authentication protocol for public key cryptosystem using dl over multiplicative group. Journal of Information and Optimization Sciences, 39(2):391-400, 2018. doi: 10.1080/02522667.2017.1411013
  • M Noroozi and Z Eslami. Public-key encryption with keyword search: A generic construction secure against online and offline keyword guessing attacks. Journal of Ambient Intelligence and Humanized Computing, 11(2):879-890, 2020. doi: 10.1007/s12652-019-01254-w
  • Mahnaz Noroozi and Ziba Eslami. Public key authenticated encryption with keyword search: revisited. IET Information Security, 13(4):336-342, 2018. doi: 10.1049/iet-ifs.2018.5315
  • N Pakniat, D Shiraly, and Z Eslami. Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial iot. Journal of Information Security and Applications, 53:102525, 2020. doi: 10.1016/j.jisa.2020.102525
  • Nasrollah Pakniat. Public key encryption with keyword search and keywordguessingattack: asurvey. In Proceedingsof 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, pages 1-4. ISCISC), 2016.
  • Ou Ruan, Qingping Wang, and Zihao Wang. Provably leakage-resilient three-party password-based authenticated key exchange. Journal of Ambient Intelligence and Humanized Computing, 10:163-173, 2019. doi: 10.1007/s12652-017-0628-8
  • Gustavus J Simmons, W Jackson, and Keith Martin. The geometry of shared secret schemes. Bulletin of the ICA, 1(2):230-236, 1991.
  • Dawn Xiaodong Song, David Wagner, and Adrian Perrig. Practical techniques for searches on encrypted data. In Proceedings of the Symposium on Security and Privacy, pages 44-55. IEEE), 2000.
  • W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li. Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Transactions on Parallel and Distributed Systems, 27(4):1187-1198, 2016.
  • P. Sundarayya and G. Vara Prasad. A public key cryptosystem using affine hill cipher under modulation of prime number. Journal of Information and Optimization Sciences, 40(4):919-930, 2019. doi: 10.1080/02522667.2018.1470751
  • Peishun Wang, Huaxiong Wang, and Josef Pieprzyk. Threshold privacy preserving keyword searches. In Proceedings of International Conference on Current Trends in Theory and Practice of Computer Science, pages 646-658. Springer), 2008.
  • Brent Waters. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Proceedings of 14th International Conference on Practice and Theory in Public Key Cryptography, pages 53-70. Springer, 2011.
  • T Y Wu, T T Tsai, and Y M Tseng. Efficient searchable id-based encryption with a designated server. Annals of telecommunications, 69(7):391-402, 2014. doi: 10.1007/s12243-013-0398-z
  • Huaichao Yan. Mass data storage and sharing algorithm in distributed heterogeneous environment. Journal of Discrete Mathematical Sciences and Cryptography, 21(2):317-326, 2018. doi: 10.1080/09720529.2018.1449306
  • Fangming Zhao, Takashi Nishide, and Kouichi Sakurai. Multi-user keyword search scheme for secure data sharing with fine-grained access control. In Proceedings of 14th International Conference on Information Security and Cryptology, pages 406-418. Springer), 2012.
  • Kobra Amiri Zirtol, Mahnaz Noroozi, and Ziba Eslami. Multi-user searchable encryption scheme with general access structure. In Proceedings of 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), pages 399-404. IEEE, 2015.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.