Distributed Searchable Asymmetric Encryption

Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a cip...

Full description

Saved in:
Bibliographic Details
Main Authors: Yin, Shoulin (Author), Teng, Lin (Author), Liu, Jie (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2016-12-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02218 am a22002893u 4500
001 ijeecs6017_5392
042 |a dc 
100 1 0 |a Yin, Shoulin  |e author 
700 1 0 |a Teng, Lin  |e author 
700 1 0 |a Liu, Jie  |e author 
245 0 0 |a Distributed Searchable Asymmetric Encryption 
260 |b Institute of Advanced Engineering and Science,   |c 2016-12-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/6017 
520 |a Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a ciphertext with key encryption, the other party with another key receives the ciphertext. Encryption key is not the same as the decryption key, and cannot deduce another key from any one of the key, thus it greatly enhances the information protection, and can prevent leakage the user's search criteria-Search Pattern. Secure schemes of SAE are practical, sometimes, however the speed of encryption/decryption in Public-key encryption is slower than private key. In order to get higher efficiency and security in information retrieval, in this paper we introduce the concept of distributed SAE, which is useful for security and can enable search operations on encrypted data. Moreover, we give the proof of security. 
540 |a Copyright (c) 2016 Indonesian Journal of Electrical Engineering and Computer Science 
540 |a http://creativecommons.org/licenses/by-nc-nd/4.0 
546 |a eng 
690 |a Asymmetric searchable encryption, PEKS , Search Pattern, DSAE 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 4, No 3: December 2016; 684-694 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v4.i3 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/6017/5392 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/6017/5392  |z Get fulltext