Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Trapdoor security in a searchable public-key encryption scheme with a designated tester

Full metadata record
DC Field Value Language
dc.contributor.authorRhee, Hyun Sook-
dc.contributor.authorPark, Jong Hwan-
dc.contributor.authorSusilo, Willy-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-08T03:28:59Z-
dc.date.available2021-09-08T03:28:59Z-
dc.date.created2021-06-11-
dc.date.issued2010-05-
dc.identifier.issn0164-1212-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/116527-
dc.description.abstractWe study a secure searchable public-key encryption scheme with a designated tester (dPEKS). The contributions of this paper are threefold. First, we enhance the existing security model to incorporate the realistic abilities of dPEKS attackers. Second, we introduce the concept of "trapdoor indistinguishability" and show that trapdoor indistinguishability is a sufficient condition for thwarting keyword-guessing attacks. This answers the open problem of how to construct PEKS (dPEKS) schemes that are provably secure against keyword-guessing attacks. Finally, we propose a dPEKS scheme that is secure in the enhanced security model. The scheme is the first dPEKS scheme that is secure against keyword-guessing attacks. (C) 2009 Elsevier Inc. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE INC-
dc.subjectCONJUNCTIVE KEYWORD SEARCH-
dc.titleTrapdoor security in a searchable public-key encryption scheme with a designated tester-
dc.typeArticle-
dc.contributor.affiliatedAuthorRhee, Hyun Sook-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1016/j.jss.2009.11.726-
dc.identifier.scopusid2-s2.0-77649179760-
dc.identifier.wosid000276535500004-
dc.identifier.bibliographicCitationJOURNAL OF SYSTEMS AND SOFTWARE, v.83, no.5, pp.763 - 771-
dc.relation.isPartOfJOURNAL OF SYSTEMS AND SOFTWARE-
dc.citation.titleJOURNAL OF SYSTEMS AND SOFTWARE-
dc.citation.volume83-
dc.citation.number5-
dc.citation.startPage763-
dc.citation.endPage771-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusCONJUNCTIVE KEYWORD SEARCH-
dc.subject.keywordAuthorKeyword search on encrypted data-
dc.subject.keywordAuthorDesignated tester-
dc.subject.keywordAuthorData security-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE