Proceedings of the 12th International Conference on Security and Cryptography 2015
DOI: 10.5220/0005577104480453
|View full text |Cite
|
Sign up to set email alerts
|

Practical and Secure Integrated PKE+PEKS with Keyword Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…Specifically, its AddToken and SearchToken primitives are used to encrypt interests and tags, respectively, and the Search primitive is used to match the encrypted tags with encrypted interests. Here, we emphasise that our solution is independent of any specific functionality offered by SUISE: other SE schemes that could effectively ensure confidentiality of interests and tags, such as [31], [39]- [41], could also be leveraged in our system.…”
Section: B Searchable Encryptionmentioning
confidence: 99%
“…Specifically, its AddToken and SearchToken primitives are used to encrypt interests and tags, respectively, and the Search primitive is used to match the encrypted tags with encrypted interests. Here, we emphasise that our solution is independent of any specific functionality offered by SUISE: other SE schemes that could effectively ensure confidentiality of interests and tags, such as [31], [39]- [41], could also be leveraged in our system.…”
Section: B Searchable Encryptionmentioning
confidence: 99%
“…In addition, PEKS does not provide a decryption functionality as PKE. Thus, schemes with both PEKS and PKE functionalities, which we call PEKS/PKE, have been proposed in [10,19,20,51,56]. SCF-PKES/PKE provides both these functionalities.…”
Section: Application To Searchable Encryptionmentioning
confidence: 99%
“…Up until now, although there have been a lot of research on searchable encryption, the only fully secure schemes [2,13,17] are inefficient to be practical enough to be used in implementation. We propose a state-of-art efficient, computationally and bandwidth-wise, fully secure practical scheme which, we believe, can be used in real applications, some of which are mentioned in Section 2.…”
Section: Our Contributionmentioning
confidence: 99%
“…At SeCrypt 2015, Buccafurri et al [13] presented an integrated public-key encryption (PKE) and public-key encryption with keyword search (PEKS) scheme (PKE+PEKS) whose security relies on the SXDH assumption. Their scheme is relatively efficient and our scheme improves upon it.…”
Section: Our Contributionmentioning
confidence: 99%
See 1 more Smart Citation