Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing.
Lisha YaoJian WengAnjia YangXiaojian LiangZhenghao WuZike JiangLin HouPublished in: Inf. Sci. (2023)
Keyphrases
- cloud computing
- proxy re encryption
- keyword search
- cca secure
- public key
- ciphertext
- identity based encryption
- encryption scheme
- keywords
- secret key
- relational databases
- digital signature
- search engine
- security model
- public key cryptography
- standard model
- data management
- private key
- security analysis
- public key cryptosystem
- structured data
- service providers
- xml documents
- xml data
- query language
- key distribution
- encryption algorithm
- secure communication
- diffie hellman
- lightweight
- query processing
- database systems
- rfid tags
- provably secure
- web search engines
- databases
- database