English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90096/105238 (86%)
Visitors : 7193355      Online Users : 580
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 資訊工程學系 > 期刊論文 >  Item 310904400/25379


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/25379


    Title: A Study of Public Key Encryption with Keyword Search
    Authors: Hs, Shih-Ting;Hsu, Shih-Ting;Ya, Chou-Chen;Yang, Chou-Chen;黃明祥;Hwang, Min-Shiang
    Contributors: 資訊工程學系
    Date: 2013-03
    Issue Date: 2013-07-11 14:19:24 (UTC+8)
    Abstract: Public Key Encryption with Keyword Search (PEKS)
    scheme enable one to search the encrypted data with a
    keyword without revealing any information. The concept
    of a PEKS scheme was proposed by Boneh et al. in 2004
    and Baek et al. who extended PEKS scheme into a secure
    channel free PEKS scheme (SCF-PEKS) which removes
    the assumption, a secure channel between users and a
    server. In this paper, we show an overview of six existing security models of PEKS/SCF-PEKS scheme and
    conclude ¯ve security requirements that must satisfy to
    construct a secure PEKS/SCF-PEKS scheme. Then we
    compare the security and e±ciency of the security models
    and discuss the future researches of PEKS/SCF-PEKS.
    Public Key Encryption with Keyword Search (PEKS)
    scheme enable one to search the encrypted data with a
    keyword without revealing any information. The concept
    of a PEKS scheme was proposed by Boneh et al. in 2004
    and Baek et al. who extended PEKS scheme into a secure
    channel free PEKS scheme (SCF-PEKS) which removes
    the assumption, a secure channel between users and a
    server. In this paper, we show an overview of six existing security models of PEKS/SCF-PEKS scheme and
    conclude ¯ve security requirements that must satisfy to
    construct a secure PEKS/SCF-PEKS scheme. Then we
    compare the security and e±ciency of the security models
    and discuss the future researches of PEKS/SCF-PEKS.
    Relation: International Journal of Network Security, V.15 N.2 : 71-79.
    Appears in Collections:[資訊工程學系] 期刊論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML115View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback