Distributed Searchable Asymmetric Encryption
Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a cip...
Saved in:
Main Authors: | , , |
---|---|
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2016-12-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02218 am a22002893u 4500 | ||
---|---|---|---|
001 | ijeecs6017_5392 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Yin, Shoulin |e author |
700 | 1 | 0 | |a Teng, Lin |e author |
700 | 1 | 0 | |a Liu, Jie |e author |
245 | 0 | 0 | |a Distributed Searchable Asymmetric Encryption |
260 | |b Institute of Advanced Engineering and Science, |c 2016-12-01. | ||
500 | |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/6017 | ||
520 | |a Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a ciphertext with key encryption, the other party with another key receives the ciphertext. Encryption key is not the same as the decryption key, and cannot deduce another key from any one of the key, thus it greatly enhances the information protection, and can prevent leakage the user's search criteria-Search Pattern. Secure schemes of SAE are practical, sometimes, however the speed of encryption/decryption in Public-key encryption is slower than private key. In order to get higher efficiency and security in information retrieval, in this paper we introduce the concept of distributed SAE, which is useful for security and can enable search operations on encrypted data. Moreover, we give the proof of security. | ||
540 | |a Copyright (c) 2016 Indonesian Journal of Electrical Engineering and Computer Science | ||
540 | |a http://creativecommons.org/licenses/by-nc-nd/4.0 | ||
546 | |a eng | ||
690 | |a Asymmetric searchable encryption, PEKS , Search Pattern, DSAE | ||
655 | 7 | |a info:eu-repo/semantics/article |2 local | |
655 | 7 | |a info:eu-repo/semantics/publishedVersion |2 local | |
655 | 7 | |2 local | |
786 | 0 | |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 4, No 3: December 2016; 684-694 | |
786 | 0 | |n 2502-4760 | |
786 | 0 | |n 2502-4752 | |
786 | 0 | |n 10.11591/ijeecs.v4.i3 | |
787 | 0 | |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/6017/5392 | |
856 | 4 | 1 | |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/6017/5392 |z Get fulltext |