2017
DOI: 10.1007/978-3-319-61176-1_21
|View full text |Cite
|
Sign up to set email alerts
|

High-Speed High-Security Public Key Encryption with Keyword Search

Abstract: Data privacy is one of the main concerns for clients who rely on cloud storage services. Standard encryption techniques can offer confidentiality; however, they prevent search capabilities over the encrypted data, thereby significantly degrading the utilization of cloud storage services. Public key Encryption with Keyword Search (PEKS) schemes offer encrypted search functionality to mitigate the impacts of privacy versus data utilization dilemma. PEKS schemes allow any client to encrypt their data under a publ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(16 citation statements)
references
References 41 publications
0
15
0
1
Order By: Relevance
“…More precisely, a PEKS scheme is defined as a tuple of four algorithms PEKS = (KeyGen, PEKS, Trapdoor, Test) [8]:…”
Section: Public-key Encryption With Abstractearchmentioning
confidence: 99%
See 1 more Smart Citation
“…More precisely, a PEKS scheme is defined as a tuple of four algorithms PEKS = (KeyGen, PEKS, Trapdoor, Test) [8]:…”
Section: Public-key Encryption With Abstractearchmentioning
confidence: 99%
“…• PEKS for privacy-preserving preselection. A latticebased public-key encryption with keyword search (PEKS) scheme [8] is applied to achieve an privacypreserving search based on soft-biometric attributes on an encrypted biometric reference database. The preselection approach does not reveal any additional information about the data subjects.…”
Section: Introductionmentioning
confidence: 99%
“…We chose Amazon Web Server (AWS) as the server in our system, a commodity hardware and an ARM Cortex-A53 as the client machines. One can easily see the importance of a fullfledged implementation when comparing the benchmark provided from the simulation results in [19] and the benchmark results of the implementation in Section 4. Detailed experimental results are further explained in Section 4.…”
Section: Our Contributionmentioning
confidence: 99%
“…We highlight the main differences of this article and its preliminary version in [19] as follows: (i) We provide a full-fledged implementation of NTRU-PEKS and its most efficient counterpart (i.e., BCOP [5]) on commodity hardware, ARM processor and cloud server. (ii) We introduce the first LWE-based PEKS scheme in the standard model (LWE-PEKS) with a security reduction to the worst-case latticebased problems.…”
Section: Differences Between This Article and Its Preliminary Versionmentioning
confidence: 99%
“…There are many directions on the research of PEKS. For example, some schemes [24][25][26] are constructed to possess resistance against for a quantum attack by founding on lattice-based cryptography. Other direction is to prohibit reusing a token (namely, a trapdoor), Sharma et al proposed a scheme which can evaluate the freshness of the token in [27].…”
Section: Related Searchable Techniquesmentioning
confidence: 99%