scispace - formally typeset
Journal ArticleDOI

Proxy re-encryption with keyword search

Reads0
Chats0
TLDR
A concrete construction is proposed, which is proven secure in the random oracle model, based on the modified Decisional Bilinear Diffie-Hellman assumption.
About
This article is published in Information Sciences.The article was published on 2010-07-01. It has received 166 citations till now. The article focuses on the topics: Alice and Bob & Proxy re-encryption.

read more

Citations
More filters
Journal ArticleDOI

Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain

TL;DR: A blockchain-based secure and privacy-preserving PHI sharing (BSPP) scheme for diagnosis improvements in e-Health systems and security analysis demonstrates that the proposed protocol can meet with the security goals.
Journal ArticleDOI

Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues

TL;DR: This paper presents a comprehensive analysis of the data security and privacy threats, protection technologies, and countermeasures inherent in edge computing, and proposes several open research directions of data security in the field of edge computing.
Journal ArticleDOI

Public key encryption with keyword search secure against keyword guessing attacks without random oracle

TL;DR: This paper defines the strongest model of PEKS which is secure channel free and secure against chosen keyword attack, chosen ciphertext attack, and keyword guessing attack and presents two important security notions namely IND-SCF-CKCA and IND-KGA.
Journal ArticleDOI

Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds

TL;DR: A system model and a security model are formulated for the proposed Re-dtPECK scheme to show that it is an efficient scheme proved secure in the standard model and has a low computation and storage overhead.
Journal ArticleDOI

Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing

TL;DR: The research challenges and directions concerning cyber security to build a comprehensive security model for EHR are highlighted and some crucial issues and the ample opportunities for advanced research related to security and privacy of EHRs are discussed.
References
More filters
Book ChapterDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
Journal ArticleDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Book ChapterDOI

Public Key Encryption with Keyword Search

TL;DR: This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email.
Journal ArticleDOI

Improved proxy re-encryption schemes with applications to secure distributed storage

TL;DR: Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security.
Book ChapterDOI

Divertible protocols and atomic proxy cryptography

TL;DR: A definition of protocol divertibility is given that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohta's definition in the case of interactive zero-knowledge proofs and generalizes to cover several protocols not normally associated with divertibility.
Related Papers (5)