Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security.
Jingwei LuHongbo LiJianye HuangSha MaMan Ho Allen AuQiong HuangPublished in: Inf. (2023)
Keyphrases
- public key cryptography
- public key
- keyword search
- authentication scheme
- diffie hellman
- proxy re encryption
- key exchange
- security model
- signature scheme
- session key
- elliptic curve cryptography
- security analysis
- key exchange protocol
- digital signature
- public key infrastructure
- private key
- public key cryptosystem
- keywords
- relational databases
- provably secure
- key agreement protocol
- search engine
- encryption scheme
- structured data
- secret key
- image authentication
- bilinear pairings
- key distribution
- xml documents
- xml data
- secure communication
- standard model
- elliptic curve
- authentication protocol
- blind signature
- image encryption
- security services
- blind signature scheme
- ciphertext
- key management
- identity based encryption
- cca secure
- query language
- access control
- security properties
- rfid tags
- security mechanisms
- signcryption scheme
- secret sharing scheme
- databases
- user authentication