Public key authenticated encryption with multiple keywords search using Mamdani system

نویسندگان

چکیده

The public cloud environment has attracted massive attackers to exploit insecure ports and access data, services other resources. Techniques, such as Public Key Encryption with Keyword Search (PEKS), could be deployed in security avoid accidents. PEKS allows users search encrypted documents by a specific keyword without compromising the original data security. first scheme was proposed 2004, since then, been experienced great progress. Recently, Kazemian Ma firstly incorporated Fuzzy Logic technique scheme, namely “Public Multi-keywords using Mamdani System (m-PEMKS)”, order support (i.e. “latest”, “biggest”) Search. However, m-PEMKS ability prevent Off-line Guessing Attack (OKGA) but it may suffer Inside (IKGA). This paper will revisit propose robust mechanism. properties of Ciphertext Indistinguishability, Trapdoor Indistinguishability User Authentication which can OKGA IKGA. Besides, supports both Multiple Keywords therefore, is more practical applied general networks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Timed-Release Public Key Based Authenticated Encryption

In this paper, we formally define a notion of timed-release public key based authenticated encryption (TR-PKAE). In addition to standard time-independent security properties (such as IND-CCA security for confidentiality and ciphertext/plaintext unforgeability), TR-PKAE introduces requirements such as timed-release receiver confidentiality (IND-RTR-CCA), which precludes the receiver from decrypt...

متن کامل

Public Key Encryption with Searchable Keywords Based on Jacobi Symbols

Vishal Saraswat (CRRao AIMSCS) Searchable Encryption APHRDI, 22/09/16 10 / 46 Vishal Saraswat Some other projects Abstract Public-key encryption with keyword search (PEKS) schemes are useful to delegate searching capabilities on encrypted data to a third party, who does not hold the entire secret key, but only an appropriate token which allows searching operations but preserves data privacy. PE...

متن کامل

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

Public Key Encryption with Keyword Search Revisited

The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, “refreshing keywords”, “removing secure channel”, and “processing multiple keywords”, which have not been c...

متن کامل

Public Key Encryption with Keyword Search

We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. W...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Evolving Systems

سال: 2021

ISSN: ['1868-6478', '1868-6486']

DOI: https://doi.org/10.1007/s12530-021-09387-0