2014
DOI: 10.1007/s12204-014-1522-6
|View full text |Cite
|
Sign up to set email alerts
|

Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…By limiting the one who can do the test operation, Ma et al [20] proposed a PEKS scheme, which is able to resist KGA. Wang et al [21] proposed a SE scheme with two servers working together, the servers perform the ciphertext retrieval operation by sharing the secret retrieval trapdoor. Unfortunately, the KGA initiated by the inside adversary, namely IKGA, makes the schemes [18][19][20][21] that can only resist outside KGA no longer safe.…”
Section: Related Workmentioning
confidence: 99%
“…By limiting the one who can do the test operation, Ma et al [20] proposed a PEKS scheme, which is able to resist KGA. Wang et al [21] proposed a SE scheme with two servers working together, the servers perform the ciphertext retrieval operation by sharing the secret retrieval trapdoor. Unfortunately, the KGA initiated by the inside adversary, namely IKGA, makes the schemes [18][19][20][21] that can only resist outside KGA no longer safe.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, the server cannot guess the accurate target keyword. -Type-III: The schemes, in [18,39], make good use of two non-colluding servers. The receiver can split a complete search procedure into two phases and delegate the phases to the two non-colluding servers, respectively.…”
Section: Motivationmentioning
confidence: 99%
“…Fang et al [16], Xu et al [17] and Guo et al [18] later attempted to construct PEKS schemes that are secure against OKGA, but these schemes still did nothing to inside attackers. Wang et al [19] creatively set two cloud servers without collusion in their framework to resist IKGA. Chen et al [20] applied a similar idea and proposed a new model called dual-server public key encryption with keyword search (DS-PEKS) that could resist IKGA.…”
Section: Related Workmentioning
confidence: 99%