ASIA unversity:Item 310904400/25379
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 90452/105769 (86%)
造访人次 : 11946673      在线人数 : 395
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    ASIA unversity > 資訊學院 > 資訊工程學系 > 期刊論文 >  Item 310904400/25379


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://asiair.asia.edu.tw/ir/handle/310904400/25379


    题名: A Study of Public Key Encryption with Keyword Search
    作者: Hs, Shih-Ting;Hsu, Shih-Ting;Ya, Chou-Chen;Yang, Chou-Chen;黃明祥;Hwang, Min-Shiang
    贡献者: 資訊工程學系
    日期: 2013-03
    上传时间: 2013-07-11 14:19:24 (UTC+8)
    摘要: Public Key Encryption with Keyword Search (PEKS)
    scheme enable one to search the encrypted data with a
    keyword without revealing any information. The concept
    of a PEKS scheme was proposed by Boneh et al. in 2004
    and Baek et al. who extended PEKS scheme into a secure
    channel free PEKS scheme (SCF-PEKS) which removes
    the assumption, a secure channel between users and a
    server. In this paper, we show an overview of six existing security models of PEKS/SCF-PEKS scheme and
    conclude ¯ve security requirements that must satisfy to
    construct a secure PEKS/SCF-PEKS scheme. Then we
    compare the security and e±ciency of the security models
    and discuss the future researches of PEKS/SCF-PEKS.
    Public Key Encryption with Keyword Search (PEKS)
    scheme enable one to search the encrypted data with a
    keyword without revealing any information. The concept
    of a PEKS scheme was proposed by Boneh et al. in 2004
    and Baek et al. who extended PEKS scheme into a secure
    channel free PEKS scheme (SCF-PEKS) which removes
    the assumption, a secure channel between users and a
    server. In this paper, we show an overview of six existing security models of PEKS/SCF-PEKS scheme and
    conclude ¯ve security requirements that must satisfy to
    construct a secure PEKS/SCF-PEKS scheme. Then we
    compare the security and e±ciency of the security models
    and discuss the future researches of PEKS/SCF-PEKS.
    關聯: International Journal of Network Security, V.15 N.2 : 71-79.
    显示于类别:[資訊工程學系] 期刊論文

    文件中的档案:

    档案 大小格式浏览次数
    index.html0KbHTML174检视/开启


    在ASIAIR中所有的数据项都受到原著作权保护.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈