Keyword search protocol with privacy preservation using ID-based proxy reencryption.
Feng ShaoShun ZhangHong ZhongRunhua ShiJie CuiPublished in: Int. J. Secur. Networks (2016)
Keyphrases
- privacy preservation
- keyword search
- proxy re encryption
- security model
- provably secure
- privacy preserving
- blind signature
- standard model
- public key
- key distribution
- search engine
- relational databases
- keywords
- trusted third party
- blind signature scheme
- structured data
- data privacy
- signature scheme
- data mining
- privacy preserving data mining
- privacy protection
- keyword queries
- xml keyword search
- xml documents
- data quality
- security analysis
- xml data
- digital signature
- query language
- sensitive information
- private information
- key management
- access control
- web search engines
- data model
- database
- smart card
- secret key
- sensitive data
- security requirements
- web search
- hash functions
- rfid tags