2016
DOI: 10.1109/tifs.2016.2599293
|View full text |Cite
|
Sign up to set email alerts
|

Server-Aided Public Key Encryption With Keyword Search

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
49
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 151 publications
(49 citation statements)
references
References 17 publications
0
49
0
Order By: Relevance
“…Recently, a practical PEKS scheme with resistance against off-line KGA was proposed [15]. The keyword to be encrypted is derived from a key server that is separate from the storage server.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, a practical PEKS scheme with resistance against off-line KGA was proposed [15]. The keyword to be encrypted is derived from a key server that is separate from the storage server.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, for long-lived data, the protection provided by secret sharing could be insufficient [20]. Furthermore, the server-aided PEKS [15] is also confronted with online KGA, where the adversarial cloud server is able to impersonate a sender to access the key server such that it obtains enough server-derived keywords to perform off-line KGA.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…By splitting the test algorithm into two parts and having two separate servers execute separately, their solution can prevent inside KGA from malicious servers. In 2016, Chen et al proposed a server‐aided PEKS and gave a general transformation from PEKS to server‐aided PEKS by requiring a blind signature. In their scheme, each PEKS ciphertext and trapdoor requires two extra double-struckZpn elements for transmission between the server and the user compared with the traditional PEKS …”
Section: Introductionmentioning
confidence: 99%
“…Since it is posed, PEKS has drawn high attention in the academic circle. A lot of PEKS schemes and variants were proposed. Some works investigated how to securely integrate standard public key encryption (PKE) with PEKS to form a full PKE + PEKS cryptosystem.…”
Section: Introductionmentioning
confidence: 99%