scholarly journals Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 146542-146551 ◽  
Author(s):  
Yulei Zhang ◽  
Long Wen ◽  
Yongjie Zhang ◽  
Caifen Wang
2019 ◽  
Vol 481 ◽  
pp. 330-343 ◽  
Author(s):  
Hongbo Li ◽  
Qiong Huang ◽  
Jian Shen ◽  
Guomin Yang ◽  
Willy Susilo

2022 ◽  
pp. 102390
Author(s):  
Danial Shiraly ◽  
Nasrollah Pakniat ◽  
Mahnaz Noroozi ◽  
Ziba Eslami

2020 ◽  
Vol 516 ◽  
pp. 515-528 ◽  
Author(s):  
Baodong Qin ◽  
Yu Chen ◽  
Qiong Huang ◽  
Ximeng Liu ◽  
Dong Zheng

Author(s):  
Biwen Chen ◽  
Libing Wu ◽  
Sherali Zeadally ◽  
Debiao He

2021 ◽  
pp. 193-213
Author(s):  
Xueqiao Liu ◽  
Kai He ◽  
Guomin Yang ◽  
Willy Susilo ◽  
Joseph Tonien ◽  
...  

2021 ◽  
pp. 19-38
Author(s):  
Baodong Qin ◽  
Hui Cui ◽  
Xiaokun Zheng ◽  
Dong Zheng

2019 ◽  
Vol 2019 ◽  
pp. 1-16 ◽  
Author(s):  
Binrui Zhu ◽  
Jiameng Sun ◽  
Jing Qin ◽  
Jixin Ma

The cloud-assisted Internet of Things (CIoT) is booming, which utilizes powerful data processing capabilities of the cloud platform to solve massive Internet of Things (IoT) data. However, the CIoT faces new security challenges, such as the confidentiality of the outsourced data. Data encryption is a fundamental technique that can guarantee the confidentiality of outsourced data, but it limits target encrypted data retrieval from cloud platform. Public key encryption with keyword search (PEKS) provides a promising solution to address this problem. In PEKS, a cloud server can be authorized to search the keyword in encrypted documents and retrieve associated encrypted documents for the receiver. However, most existing PEKS schemes merely focus on keyword search function while ignoring the associated documents encryption/decryption function. Thus, in practice, a PEKS scheme must cooperate with another separated public key encryption (PKE) scheme to fulfill a completely secure data sharing scheme. To address this problem, in this paper, we propose a secure data sharing scheme with designated server that combines PKE scheme with PEKS scheme, which provides both keyword search and documents encryption/decryption functions. Furthermore, only the designated server can search the keyword via encrypted documents for enhanced security in our work. Moreover, our scheme also satisfies the public verifiability of search results, which includes both keywords and documents ciphertexts’ correctness and integrity. As to the security, our scheme provides stronger indistinguishability security of document and keyword in the proposed security model.


2015 ◽  
Vol 16 (13) ◽  
pp. 1851-1858 ◽  
Author(s):  
Yousheng Zhou ◽  
Guangxia Xu ◽  
Yong Wang ◽  
Xiaojun Wang

Sign in / Sign up

Export Citation Format

Share Document