Public key authenticated encryption with multiple keywords search using Mamdani system
نویسندگان
چکیده
The public cloud environment has attracted massive attackers to exploit insecure ports and access data, services other resources. Techniques, such as Public Key Encryption with Keyword Search (PEKS), could be deployed in security avoid accidents. PEKS allows users search encrypted documents by a specific keyword without compromising the original data security. first scheme was proposed 2004, since then, been experienced great progress. Recently, Kazemian Ma firstly incorporated Fuzzy Logic technique scheme, namely “Public Multi-keywords using Mamdani System (m-PEMKS)”, order support (i.e. “latest”, “biggest”) Search. However, m-PEMKS ability prevent Off-line Guessing Attack (OKGA) but it may suffer Inside (IKGA). This paper will revisit propose robust mechanism. properties of Ciphertext Indistinguishability, Trapdoor Indistinguishability User Authentication which can OKGA IKGA. Besides, supports both Multiple Keywords therefore, is more practical applied general networks.
منابع مشابه
Timed-Release Public Key Based Authenticated Encryption
In this paper, we formally define a notion of timed-release public key based authenticated encryption (TR-PKAE). In addition to standard time-independent security properties (such as IND-CCA security for confidentiality and ciphertext/plaintext unforgeability), TR-PKAE introduces requirements such as timed-release receiver confidentiality (IND-RTR-CCA), which precludes the receiver from decrypt...
متن کاملPublic Key Encryption with Searchable Keywords Based on Jacobi Symbols
Vishal Saraswat (CRRao AIMSCS) Searchable Encryption APHRDI, 22/09/16 10 / 46 Vishal Saraswat Some other projects Abstract Public-key encryption with keyword search (PEKS) schemes are useful to delegate searching capabilities on encrypted data to a third party, who does not hold the entire secret key, but only an appropriate token which allows searching operations but preserves data privacy. PE...
متن کاملRSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کاملPublic Key Encryption with Keyword Search Revisited
The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, “refreshing keywords”, “removing secure channel”, and “processing multiple keywords”, which have not been c...
متن کاملPublic Key Encryption with Keyword Search
We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. W...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Evolving Systems
سال: 2021
ISSN: ['1868-6478', '1868-6486']
DOI: https://doi.org/10.1007/s12530-021-09387-0