278
Views
49
CrossRef citations to date
0
Altmetric
Original Articles

Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester

, , &
Pages 2581-2587 | Received 23 Jul 2012, Accepted 19 Feb 2013, Published online: 12 Apr 2013

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (4)

Dhruti Sharma. (2023) Searchable encryption : A survey. Information Security Journal: A Global Perspective 32:2, pages 76-119.
Read now
Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Chao Meng & Eric Ke Wang. (2019) A provably secure certificateless public key encryption with keyword search. Journal of the Chinese Institute of Engineers 42:1, pages 20-28.
Read now
Yousheng Zhou, Han Guo, Feng Wang & Wenjun Luo. (2016) Multi-Key Searchable Encryption with Designated Server. Intelligent Automation & Soft Computing 22:2, pages 295-301.
Read now
Jongsung Kim, Yi Mu & Mohammad S. Obaidat. (2013) Advanced computer mathematics based cryptography and security technologies. International Journal of Computer Mathematics 90:12, pages 2512-2514.
Read now

Articles from other publishers (45)

Mohammed Raouf Senouci, Ilyas Benkhaddra, Abdelkader Senouci & Fagen Li. (2024) A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability. Telecommunication Systems.
Crossref
Mohammed Raouf Senouci, Abdelkader Senouci & Fagen Li. (2024) A pairing-free certificateless authenticated searchable encryption with multi-trapdoor indistinguishability (MTP-IND) guarantees. Telecommunication Systems 85:3, pages 443-460.
Crossref
Marco Calderini, Riccardo Longo, Massimiliano Sala & Irene Villa. (2024) Searchable encryption with randomized ciphertext and randomized keyword search. Journal of Mathematical Cryptology 18:1.
Crossref
Guiquan Yang, Sha Ma, Hongbo Li, Husheng Yang & Qiong Huang. 2024. Information Security and Cryptology. Information Security and Cryptology 299 319 .
Xiaoguang Liu, Yingying Sun & Hao Dong. (2023) A pairing-free certificateless searchable public key encryption scheme for IoMT. Journal of Systems Architecture 139, pages 102885.
Crossref
Zhenyu Hu, Lunzhi Deng, Yaying Wu, Hongyu Shi & Yan Gao. (2023) Secure and Efficient Certificateless Searchable Authenticated Encryption Scheme Without Random Oracle for Industrial Internet of Things. IEEE Systems Journal 17:1, pages 1304-1315.
Crossref
Lin Mei, Chungen Xu & Lei Xu. (2022) Conjunctive searchable encryption with efficient authorization for group sharing. Wireless Networks.
Crossref
Mohammed Raouf Senouci, Ilyas Benkhaddra, Abdelkader Senouci & Fagen Li. (2022) A provably secure free-pairing certificateless searchable encryption scheme. Telecommunication Systems 80:3, pages 383-395.
Crossref
Nitish Andola, Raghav Gahlot, Vijay Kumar Yadav, S. Venkatesan & Shekhar Verma. (2022) Searchable encryption on the cloud: a survey. The Journal of Supercomputing 78:7, pages 9952-9984.
Crossref
Venkata Bhikshapathi Chenam & Syed Taqi Ali. (2022) A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA. Computer Standards & Interfaces 81, pages 103603.
Crossref
Swapna Yenugula, Hussain Shaik, Karthik Chithapuram & Shyam Gajam. (2022) Dual Server Construction using Double Encryption. Dual Server Construction using Double Encryption.
Nazatul Haque Sultan, Nesrine Kaaniche, Maryline Laurent & Ferdous Ahmed Barbhuiya. (2022) Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment. IEEE Transactions on Cloud Computing 10:1, pages 216-233.
Crossref
Koon-Ming Chan, Swee-Huay Heng, Wei-Chuen Yau & Shing-Chiang Tan. (2022) Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review. IEEE Access 10, pages 21584-21598.
Crossref
Guang Yang, Junling Guo, Lidong Han, Xuejiao Liu & Chengliang Tian. (2021) An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. Peer-to-Peer Networking and Applications 15:1, pages 503-515.
Crossref
Xiaoguang Liu, Yingying Sun & Hao Dong. 2022. Frontiers in Cyber Security. Frontiers in Cyber Security 69 86 .
Yubo Zheng, Peng Xu, Wei Wang, Tianyang Chen, Willy Susilo, Kaitai Liang & Hai Jin. 2022. Computer Security – ESORICS 2022. Computer Security – ESORICS 2022 86 104 .
Yang Lu, Jiguo Li & Yichen Zhang. (2021) Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks. IEEE Transactions on Services Computing 14:6, pages 2041-2054.
Crossref
Sanjeet Kumar Nayak & Somanath Tripathy. (2021) SEPS: Efficient public-key based secure search over outsourced data. Journal of Information Security and Applications 61, pages 102932.
Crossref
Yang Ma & Hassan Kazemian. (2021) Public key authenticated encryption with multiple keywords search using Mamdani system. Evolving Systems 12:3, pages 687-699.
Crossref
Xiangyu Pan & Fagen Li. (2021) Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability. Journal of Systems Architecture 115, pages 102075.
Crossref
Lin Mei, Chungen Xu & Qianmu Li. 2021. Quality, Reliability, Security and Robustness in Heterogeneous Systems. Quality, Reliability, Security and Robustness in Heterogeneous Systems 303 322 .
Baodong Qin, Hui Cui, Xiaokun Zheng & Dong Zheng. 2021. Provable and Practical Security. Provable and Practical Security 19 38 .
Xuanang Yu, Yang Lu, Jinmei Tian & Fen Wang. 2021. Artificial Intelligence and Security. Artificial Intelligence and Security 253 264 .
Tianyu Chi, Baodong Qin & Dong Zheng. (2020) An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things. Wireless Communications and Mobile Computing 2020, pages 1-11.
Crossref
Yang Lu, Jiguo Li & Yichen Zhang. (2020) Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT. IEEE Internet of Things Journal 7:4, pages 2553-2562.
Crossref
Mahnaz Noroozi & Ziba Eslami. (2019) Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks. Journal of Ambient Intelligence and Humanized Computing 11:2, pages 879-890.
Crossref
Ningbin Yang, Shumei Xu & Zhou Quan. (2020) An Efficient Public Key Searchable Encryption Scheme for Mobile Smart Terminal. IEEE Access 8, pages 77940-77950.
Crossref
Lifeng Guo, Zhihao Li, Wei-Chuen Yau & Syh-Yuan Tan. (2020) A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms. IEEE Access 8, pages 26107-26118.
Crossref
M. Lilly Florence & Dhina Suresh. (2017) Enhanced secure sharing of PHR’s in cloud using user usage based attribute based encryption and signature with keyword search. Cluster Computing 22:S6, pages 13119-13130.
Crossref
Yang Lu & Jiguo Li. (2018) Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems. Cluster Computing 22:1, pages 285-299.
Crossref
Yang Lu & Jiguo Li. (2018) Constructing designated server public key encryption with keyword search schemes withstanding keyword guessing attacks. International Journal of Communication Systems 32:3.
Crossref
Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang & Jimmy Ming-Tai Wu. (2019) Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments. IEEE Access 7, pages 49232-49239.
Crossref
Yang Lu, Jiguo Li & Yichen Zhang. (2019) SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search. IEEE Access 7, pages 40878-40892.
Crossref
Hongyuan Chen, Zhenfu Cao, Xiaolei Dong & Jiachen Shen. 2019. Trust Management XIII. Trust Management XIII 162 177 .
Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jimmy Ming-Tai Wu & Jeng-Shyang Pan. 2019. Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing. Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing 178 183 .
Jingjing Xu, Chun Ying, Shuhua Tan, Zhe Sun, Pan Wang & Zhixin Sun. (2018) An Attribute-Based Searchable Encryption Scheme Supporting Trapdoor Updating. An Attribute-Based Searchable Encryption Scheme Supporting Trapdoor Updating.
Hui Cui, Zhiguo Wan, Robert H. Deng, Guilin Wang & Yingjiu Li. (2018) Efficient and Expressive Keyword Search Over Encrypted Data in Cloud. IEEE Transactions on Dependable and Secure Computing 15:3, pages 409-422.
Crossref
Yinbin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Limin Shen & Fushan Wei. (2016) VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Networking and Applications 11:2, pages 287-297.
Crossref
Yang Yang, Xianghan Zheng, Chunming Rong & Wenzhong Guo. (2018) Efficient Regular Language Search for Secure Cloud Storage. IEEE Transactions on Cloud Computing, pages 1-1.
Crossref
Tsu-Yang Wu, Chao Meng, King-Hang Wang, Chien-Ming Chen & Jeng-Shyang Pan. 2018. Genetic and Evolutionary Computing. Genetic and Evolutionary Computing 199 205 .
Tsu-Yang Wu, Chao Meng, Chien-Ming Chen, King-Hang Wang & Jeng-Shyang Pan. 2018. Advances in Intelligent Information Hiding and Multimedia Signal Processing. Advances in Intelligent Information Hiding and Multimedia Signal Processing 191 197 .
Nitish Andola, Sourabh Prakash, S. Venkatesan & Shekhar Verma. (2017) Improved secure server-designated public key encryption with keyword search. Improved secure server-designated public key encryption with keyword search.
Hui Cui, Robert H. Deng, Joseph K. Liu & Yingjiu Li. 2017. Information Security and Privacy. Information Security and Privacy 106 126 .
Yang Yang & Maode Ma. (2016) Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds. IEEE Transactions on Information Forensics and Security 11:4, pages 746-759.
Crossref
Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman & Kazumasa Omote. (2014) Generic constructions of secure‐channel free searchable encryption with adaptive security. Security and Communication Networks 8:8, pages 1547-1560.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.