Journal ArticleDOI
Proxy re-encryption with keyword search
Reads0
Chats0
TLDR
A concrete construction is proposed, which is proven secure in the random oracle model, based on the modified Decisional Bilinear Diffie-Hellman assumption.About:
This article is published in Information Sciences.The article was published on 2010-07-01. It has received 166 citations till now. The article focuses on the topics: Alice and Bob & Proxy re-encryption.read more
Citations
More filters
Journal ArticleDOI
Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain
Aiqing Zhang,Xiaodong Lin +1 more
TL;DR: A blockchain-based secure and privacy-preserving PHI sharing (BSPP) scheme for diagnosis improvements in e-Health systems and security analysis demonstrates that the proposed protocol can meet with the security goals.
Journal ArticleDOI
Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues
TL;DR: This paper presents a comprehensive analysis of the data security and privacy threats, protection technologies, and countermeasures inherent in edge computing, and proposes several open research directions of data security in the field of edge computing.
Journal ArticleDOI
Public key encryption with keyword search secure against keyword guessing attacks without random oracle
TL;DR: This paper defines the strongest model of PEKS which is secure channel free and secure against chosen keyword attack, chosen ciphertext attack, and keyword guessing attack and presents two important security notions namely IND-SCF-CKCA and IND-KGA.
Journal ArticleDOI
Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
Yang Yang,Maode Ma +1 more
TL;DR: A system model and a security model are formulated for the proposed Re-dtPECK scheme to show that it is an efficient scheme proved secure in the standard model and has a low computation and storage overhead.
Journal ArticleDOI
Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing
TL;DR: The research challenges and directions concerning cyber security to build a comprehensive security model for EHR are highlighted and some crucial issues and the ample opportunities for advanced research related to security and privacy of EHRs are discussed.
References
More filters
Book ChapterDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
Journal ArticleDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Book ChapterDOI
Public Key Encryption with Keyword Search
TL;DR: This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email.
Journal ArticleDOI
Improved proxy re-encryption schemes with applications to secure distributed storage
TL;DR: Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security.
Book ChapterDOI
Divertible protocols and atomic proxy cryptography
TL;DR: A definition of protocol divertibility is given that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohta's definition in the case of interactive zero-knowledge proofs and generalizes to cover several protocols not normally associated with divertibility.