Designated-server identity-based authenticated encryption with keyword search for encrypted emails.
Hongbo LiQiong HuangJian ShenGuomin YangWilly SusiloPublished in: Inf. Sci. (2019)
Keyphrases
- keyword search
- encryption scheme
- ciphertext
- encrypted data
- proxy re encryption
- session key
- outsourced databases
- secret key
- public key
- diffie hellman
- key exchange
- standard model
- key management
- security analysis
- authentication scheme
- search engine
- keywords
- key distribution
- relational databases
- encryption algorithm
- encryption decryption
- third party
- structured data
- xml documents
- key agreement protocol
- authentication protocol
- xml keyword search
- xml data
- search queries
- keyword queries
- data sharing
- security model
- xml databases
- smart card
- hash functions
- lossless compression
- keyword search over relational databases
- keyword search in relational databases
- service providers
- secure communication
- secret sharing scheme
- web search
- digital signature
- signature scheme
- web search engines
- data model
- chaotic sequence
- proximity search
- database
- image encryption
- cryptographic protocols
- digital libraries
- databases