Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review.
Tsu-Yang WuChien-Ming ChenKing-Hang WangJeng-Shyang PanWeimin ZhengShu-Chuan ChuJohn F. RoddickPublished in: J. Netw. Intell. (2018)
Keyphrases
- security analysis
- keyword search
- encryption scheme
- security properties
- image encryption
- key exchange
- high security
- encryption algorithm
- keywords
- relational databases
- search engine
- structured data
- smart card
- public key
- mutual authentication
- elliptic curve cryptography
- xml keyword search
- xml data
- security model
- xml documents
- keyword queries
- security requirements
- provably secure
- keyword search in relational databases
- private key
- user authentication
- authentication protocol
- secret key
- web search engines
- diffie hellman
- standard model
- authentication scheme
- ciphertext
- public key cryptography
- object oriented
- query language