Generic construction of designated tester public-key encryption with keyword search
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rhee, Hyun Sook | - |
dc.contributor.author | Park, Jong Hwan | - |
dc.contributor.author | Lee, Dong Noon | - |
dc.date.accessioned | 2021-09-06T13:32:42Z | - |
dc.date.available | 2021-09-06T13:32:42Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2012-11-01 | - |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/106967 | - |
dc.description.abstract | This paper provides two generic transformations to construct a designated tester public-key encryption with keyword search scheme using two identity-based encryption schemes. We also identify the properties of identity-based encryption that are sufficient to provide the confidentiality and consistency in designated tester public-key encryption with keyword search. The anonymity and confidentiality of identity-based encryption are sufficient for achieving confidentiality of designated tester public-key encryption with keyword search, and the confidentiality of identity-based encryption is sufficient for achieving consistency of designated tester public-key encryption with keyword search. Our constructions do not need any global set-up for the public parameters. We further extend our generic method to construct designated tester identity-based encryption with keyword search, where encryption is performed under the identity of a recipient instead of a public key. (C) 2012 Elsevier Inc. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.subject | SCHEME | - |
dc.title | Generic construction of designated tester public-key encryption with keyword search | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Noon | - |
dc.identifier.doi | 10.1016/j.ins.2012.03.020 | - |
dc.identifier.scopusid | 2-s2.0-84861580700 | - |
dc.identifier.wosid | 000305368000007 | - |
dc.identifier.bibliographicCitation | INFORMATION SCIENCES, v.205, pp.93 - 109 | - |
dc.relation.isPartOf | INFORMATION SCIENCES | - |
dc.citation.title | INFORMATION SCIENCES | - |
dc.citation.volume | 205 | - |
dc.citation.startPage | 93 | - |
dc.citation.endPage | 109 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.subject.keywordPlus | SCHEME | - |
dc.subject.keywordAuthor | Searchable public-key encryption | - |
dc.subject.keywordAuthor | Designated tester | - |
dc.subject.keywordAuthor | Data security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.