0% found this document useful (0 votes)
12 views8 pages

Journal

Uploaded by

01fe20bcs106
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views8 pages

Journal

Uploaded by

01fe20bcs106
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

TRAPDOOR PRIVACY IN PUBLIC KEY ENCRYPTION WITH

KEYWORD SEARCH
V.Shubha1, Tejashwini S. Bahaddurdesai2, Shalini R. Ronad3, Tukaram D. Channadasar4,
Dr. Bahubali Akiwate5
1,2,3,4
Students, 5Associate Professor, Dept. of Computer Science and Engineering,
KLE College of Engineering and Technology, Chikodi, Karnataka-591201
---------------------------------------------------------------------***----------------------------------------------------------------
Abstract: Therefore, it is crucial to find a balance between security and
The Public Key Encryption with Keyword Search (PEKS) accessibility while using cloud storage technology.
scheme is a powerful tool for enabling searches on ciphertext
In order to tackle the problem of secure searching over
by a server in a public-key setting. However, it is important
encrypted data, a revolutionary technique called searchable
to note that the PEKS scheme does suffer from a significant
encryption (SE) was introduced by [1]. With the help of a
vulnerability, known as the Keyword Guessing Attack
searchable encryption scheme, a server can efficiently
(KGA). This attack can allow an attacker to successfully
search for data in its encrypted form on behalf of a client,
guess the correct keyword that has been encrypted in a
without compromising the confidentiality of the plaintext
searchable ciphertext and trapdoor. Fortunately, we can
data [2]. This state-of-the-art method ensures the highest
overcome this vulnerability by relying on security notions
level of data security with minimal loss of information. It
such as keyword privacy and trapdoor privacy. By ensuring
consists of three main entities, data owner, data user, and
that the PEKS scheme satisfies trapdoor privacy, we can be
cloud server. Data owner: The one who encrypts the data
confident that it is secure against KGA.
and index before uploading to the cloud server. Data user:
The one who generates the trapdoor to enable the server to
Keywords: PEKS, searchable encryption, trapdoor privacy,
search over the encrypted data. Cloud server: The server
keyword privacy, cloud server, data user, data owner.
stores the encrypted data and helps to perform searching
operations on the cloud using the trapdoor.
ABBREVIATIONS:

Name Abbreviation There are two types of searchable encryption scheme.


Public Key Encryption with Keyword PEKS 1) Symmetric searchable encryption (SSE): Prior to
Search
outsourcing, the data is encrypted using the user's secret
Keyword Guessing Attack KGA key in the SSE scheme. Because the SSE technique is
Public Key Authenticated Encryption PAEKS based on symmetric primitives and has less
with Keyword Search computational overhead, it has the advantage of being
Advanced Encryption Standard AES efficient. This scheme's functionality typically only
Searchable Encryption SE applies to single user scenarios, which is a drawback.
Symmetric Searchable Encryption SSE
2) Public Key Encryption with Keyword Search
I. INTRODUCTION (PEKS): In the PEKS scheme, the user's public key is
used to encrypt the data before it gets outsourced. This
The use of cloud storage technology to store and retrieve data approach was first introduced by R. Behnia et al. [17].
from the cloud is an excellent option to resolve the issue of Although this scheme can be used in a multiuser setting,
maintaining large amounts of data on the internet. However, it has been criticized for its low efficiency. Most of the
it is important to consider the security of the data owner PEKS schemes necessitate the computation of pairings
while using this technology. Storing the data in the plaintext on elliptic curves, which is a relatively slow process, as
format would put the confidentiality of the data owner at risk, per Abhishek Bisht, Ashok Kumar Das [2].
while storing the data in the encrypted format would pose a
significant problem when searching for data on the cloud. Recent research efforts have been directed towards
enhancing the security and practicality of the PEKS scheme,
Trapdoor
TrapdoorPrivacy
PrivacyininPublic
PublicKey
KeyEncryption
Encryptionwith
withKeyword
KeywordSearch
Search

making it suitable for real-world applications. Despite the search schemes over encrypted data’’,. It demonstrated
threat posed by keyword guessing attacks (KGAs), we have that anyone can retrieve information of certain keyword
developed robust security measures such as keyword from any captured query messages. An offline keyword
privacy and trapdoor privacy to protect against information guessing attack (KGA) is a type of attack that allows a
leakage from the keyword and trapdoor sides. In particular, server to attack after receiving a considerable snumber
trapdoor privacy is a crucial feature that must be met by any of trapdoors.
PEKS scheme to ensure its resilience against KGAs. With
these measures in place, we can confidently deploy the [5] Yunhong Zhou, Licheng Wang, Yanmei Tian, “Public
PEKS scheme with minimal security concerns. key encryption with keyword in cloud”. It enables one
to search Patel for encrypted keywords without
The main focus of this review is on trapdoor privacy in compromising the security of the original data. Users
various types of PEKS schemes. We begin by summarizing can outsource encrypted data and keywords to a cloud
the development of PEKS schemes and then introduce the server.
concept of trapdoor privacy. We compare different PEKS
schemes in terms of their underlying tools, computational
[6] L. Pu, C. Lin, B. Chen and D. He, "User-Friendly
hardness, system model, search function, security properties
Public-Key Authenticated Encryption With Keyword
of keyword privacy and trapdoor privacy, and their security
Search for Industrial Internet of Things". It is
against offline KGA and online KGA attacks. Finally, we
significantly reduced comparing with most existing
suggest some potential research directions for the PEKS
classical PEKS schemes without causing other
scheme and conclude this review.
communication costs or security loss.

II. LITERATURE SURVEY


[7] Y. Lu and J. Li, ‘‘Lightweight public key authenticated
encryption with keyword search against adaptively-
[1] Chang song Jiang, Zhao Zhang, Kefei Chen, Chunxiang
chosen targets adversaries for mobile devices’’. It is a
Xu, “Subversion-resistant public key encryption with
more efficient and secure alternative to traditional
keyword search”. The outcomes of this paper is by
cryptography. It is suitable for IoT applications that are
adopting a public key cryptosystem based on bilinear
limited by power consumption, resources, and energy.
pairings. PEKS provides secure searchable data
encryption in cloud storage. Users can outsource
[8] R. Behnia, M. O. Ozmen and A. A. Yavuz, "Lattice-
encrypted data and keywords to a cloud server.
Based Public Key Searchable Encryption from
Experimental Perspectives". Lattice-based
[2] Sudeep Ghosh, Abhishek Bisht, Ashok Kumar Das,
cryptography is regarded as the rival to a quantum
“Provably secure public key encryption with keyword
computer attack and the future of post-quantum
search for data processing “. A generic PEKS strategy
cryptography and it provides the security, efficiency,
uses a keyword and public key to execute a PEKS
lower energy consumption, and speed.
algorithm and produce keyword search. To achieve data
security, access control, privacy preservation and
secure search. III. EXISTING SYSTEM

[3] M. H. Noorallahzade, R. Alimoradi, A. Gholami, "A In the existing system public key encryption with keyword
Survey on Public Key Encryption with Keyword search (PEKS) technique enables servers operating in a
Search: Taxonomy and Methods". Create the public-key environment to conduct searches over cipher
necessary familiarity by expressing various evaluation text. The keyword guessing attack is a serious flaw in the
criteria from different perspectives of security. PEKS system. Using a searchable cipher text and trapdoor,
the attacker can use a keyword guessing attack (KGA) to
[4] J. W. Byun, H. S. Rhee, H.-A. Park, and D. H. Lee, successfully guess the right term. Security concepts like
‘‘Off-line keyword guessing attacks on recent keyword keyword privacy and trapdoor privacy were created to
address this vulnerability.
Trapdoor Privacy in Public Key Encryption with Keyword Search

In the existing method evaluate different PEKS


scheme types in terms of their computational complexity,
system model, search function, security characteristics of
keyword and trapdoor privacy, and resistance to offline and
online KGA. The trapdoor privacy and keyword privacy
are crucial for a PEKS scheme to be secure against KGA.
There are two types of searchable encryption
construction: the first one is called SSE and it is based on
symmetric encryption, which involves only a secret key in
the encryption and decryption processes. However, since
symmetric encryption is not ideal for multi-user settings
and it has a secret key distribution issue, it is not very
popular. To address these problems, public key encryption
Fig 1: Structure of PEKS scheme
with keyword search was introduced. This construction is
based on asymmetric encryption, which uses a pair of
public and private keys in the encryption and decryption KEYWORD GUESSING ATTACK (KGA):
processes. This makes it more suitable for multi-user
settings. The PEKS scheme is vulnerable to a type of attack called a
A PEKS scheme mainly consists of four polynomial time keyword guessing attack (KGA). This attack takes
randomized algorithms: advantage of the low entropy in the keyword space and
1) KeyGen (s): This is a key generation algorithm allows the attacker to correctly guess the keyword that has
that is run by a data receiver. This algorithm takes been encrypted in the given trapdoor. There are two
in a s (security parameter), and outputs a public key categories of KGA - offline and online. The offline attack
Apub(A’s public key) and private key Apriv (A’s involves the attacker having access to the encrypted
private key). trapdoors and the associated keywords, while the online
2) PEKS (Apub, W): This encryption algorithm that attack involves the attacker sending trapdoor requests to the
is run by a data sender. It takes in data receiver’s server to try and guess the correct keyword.
public key Apub and a W (Keyword) and outputs a Offline keyword guessing attack can be carried out
S (keyword ciphertext) of W. by two types of attackers - outsider attacker and insider
3) Trapdoor (A, W): This is a keyword trapdoor attacker. The outsider attacker is a malicious party who is
generation algorithm that is run by the data not associated with the service provider. They can intercept
receiver. This algorithm takes in the data receiver’s the public channel between the server and receiver to obtain
private key Apriv and a query keyword W and a trapdoor that is transmitted over the public channel. On the
outputs the Tw (trapdoor) for the query keyword W. other hand, an insider attacker is a malicious server who can
4) Test (Apub, S, Tw): This test algorithm is run by obtain the trapdoor from any receiver. Both outsider and
the public server. It takes in the data receiver’s insider attackers can access the keyword ciphertext and the
public key Apub, a keyword ciphertext S = PEKS trapdoor. However, the only difference between them is that
(Apub, W0) and a trapdoor Tw = Trapdoor (Apriv, the outsider attacker cannot perform the test algorithm (in
W). It outputs ‘yes’ if W = W0 else the output is the case of the dPEKS scheme), while the insider attacker
‘no’. can perform the test algorithm. This makes it more difficult
to resist the insider attacker.
Name Abbreviation Online KGA is a security vulnerability that can
A’s public key Apub only be exploited by an external attacker. This attacker can
A’s private key Apriv upload a specifically designed ciphertext of their chosen
security parameter s keyword to the server instead of running the test algorithm.
Keyword W They can then monitor the communication channel until the
trapdoor Tw crafted ciphertext is queried by a receiver. Once the receiver
keyword of ciphertext S
Trapdoor Privacy in Public Key Encryption with Keyword Search

searches for the keyword, the attacker can guess the correct be queried for trapdoor previously. The challenger
keyword for the corresponding trapdoor. chooses a random b and sends a ciphertext C PEKS
(Apub Wb) to the attacker.
4) The attacker can continue to query for trapdoor TW for
IV. PROPOSED SYSTEM any keyword W, except for the challenge keywords W0
and W1.
The first PEKS scheme was developed using a public key 5) The attacker wins the game if he/she guessed the correct
cryptosystem that employed bilinear pairings. This scheme random b.
was derived from the identity-based encryption scheme. A
typical PEKS scheme involves inputting a keyword and a B. TRAPDOOR PRIVACY:
public key, which generates a keyword ciphertext via the Keyword privacy is an important aspect of a PEKS (Public
PEKS algorithm. This keyword ciphertext is then stored on a Key Encryption with Keyword Search) that ensures that no
cloud server. The receiver can then generate a trapdoor by information about the keyword is leaked from the searchable
running the Trapdoor algorithm with a private key and the ciphertext. Most of the PEKS schemes satisfy this property.
desired keyword as inputs. This trapdoor is sent to the cloud However, Rhee et al. found that the security of the trapdoor
server to run the Test algorithm for searching. The creators is also significant in constructing a PEKS scheme that is
of the scheme also provided a transformation technique that secure against keyword guessing attack. Trapdoor privacy
constructs a secure PEKS scheme, guaranteeing consistency guarantees that no information about the keyword is leaked
from an anonymous identity-based encryption scheme. from the trapdoor. To capture this issue, Rhee et al. proposed
Zhang et al. [18] proposed a more efficient PEKS the notion of trapdoor indistinguishability. The notion of
scheme by eliminating the pairing operation in the trapdoor indistinguishability should prevent an outsider
encryption process. This scheme is designed to be secure attacker from distinguishing between the trapdoor of two
against insider keyword guessing attacks by using the sign challenge keywords of their choice. This should be done
encryption algorithm to generate searchable ciphertext. The under the condition that the attacker is allowed to obtain
proposed scheme achieves trapdoor privacy in the random trapdoors for any non-challenge keywords.
oracle model and logarithmic time pairing-free searching J. Hou[19] proposed a security notion to address
over encrypted data. trapdoor privacy, which is called Perfect Keyword Privacy
(PKP) and Search Pattern Privacy (SPP). This notion was
A. KEYWORD PRIVACY: later formalized by K. Emura et al[10]. and is called Weak
Keyword privacy refers to the condition that the adversary Key Unlinkability. However, it was found that Weak Key
should not be able to distinguish between two ciphertexts of Unlinkability failed to hide the search patterns when more
keywords W0 and W1, respectively, when no trapdoors are than two trapdoors were queried. To overcome this
obtained for the respective keywords. In order to deficiency, they proposed a stronger notion called Strong
demonstrate that the PEKS (Public Key Encryption with Key Unlinkability. Strong Key Unlinkability allows
Keyword Search) scheme is indistinguishable against chosen adversaries to query multiple trapdoors while protecting the
keyword attack (IND-CKA), a game is played between an search pattern at the same time.
attacker and a challenger. In order to construct a secure PEKS scheme, it is
crucial to consider the security of the trapdoor as well as the
A PEKS IND-CKA game is defined as follows: keyword privacy. A major challenge for the PEKS scheme is
1) The challenger first runs the Key Gen (s) algorithm to the keyword guessing attack, which makes the searchable
generate public keys Apub and private key Apriv. Public keyword and trapdoor vulnerable to points of attack when
key Apub is given to the attacker. transmitted over the network. Therefore, solely relying on
2) The attacker can adaptively query for the trapdoor T W keyword privacy is not sufficient to ensure the security of the
for any keyword W of his/her choice from the PEKS scheme since it only protects the privacy from the
challenger. sender side. To be secure against an offline keyword
3) When the attacker is ready, he/she will send two words guessing attack from an outsider attacker, the PEKS scheme
W0 and W1 that he/she wishes to be challenged to the must satisfy both keyword privacy and trapdoor privacy,
challenger. The words chosen by the attacker should not
Trapdoor Privacy in Public Key Encryption with Keyword Search

which protect the privacy from both the sender and the transformation shifts data rows. The third mixes columns.
receiver side. Many studies have proposed a PEKS scheme The last transformation is performed on each column using
with trapdoor privacy and security against offline keyword a different part of the encryption key. Longer keys need
guessing attacks. However, some of these proposals suffer more rounds to complete. The following are the steps of
from inefficiency, as they use computationally expensive AES:
bilinear pairing operations, only allowing single keyword Step 1: Initially the 16-byte key or a 4-word key is
search functionality and higher communication cost. expanded to an array of 44 words where each word is of 4
bytes.
ALGORITHM: Step 2: At the very first of encryption process the 16-byte
A. ADVANCED ENCRYPTION STANDARD plain text block or 4-word plain text block is XORed with
(AES): the 4-word key i.e. W0, W1, W2, W3. The resultant of this
Advanced Encryption Standard was introduced by NIST XOR is provided to the 1st round.
(National Institute of Standard and Technology) in the year Step 3: In the first round, the result of XOR is processed
2001. It is a symmetric block cipher. AES cipher intakes by the Substitute Bytes, Shift Rows, Mix Column and Add
the 128bit plain text block accompanied by a 128-bit key Round Key functions in the respective sequence. To the
to generate cipher text block of 128-bit. And while Add Round Key function, the next 4 words from the
decryption it takes 128-bit cipher text block along with expanded key are provided that are W4, W5, W6, W7. The
expanded key used in encryption in reverse order to recover corresponding result of first-round is provided to the
the plain text block of 128-bit. A round has four functions second round.
among which one is of permutation and three are of Step 4: All round till round nine, performs the same
substitution: functions and in each round, a distinct key is provided from
Substitute Byte, Mix Column and Add Round Key the expanded key. In round ten only three functions are
functions are substitution functions whereas Shift Rows is performed on the input provided by round 9 that are
a permutation function. Both the encryption and decryption Substitute Bytes, Shift Rows and Add Round Key function.
process starts with the Add Round Key function which is The result of round 10 is the cipher text block of the
then followed by the nine-round which has all four corresponding pain text block.
substitutions and permutation function but the last tenth
round has only three functions.
B. TRAPDOOR:
A trap door is kind of a secret entry point into a program that
allows anyone to gain access to any system without going
through the usual security access procedures. Another
definition of a trapdoor is it is a method of bypassing normal
authentication methods. Therefore, it is also known as a back
door. Trapdoors are quite difficult to detect and also in order
to find them the programmers or the developers have to go
through the components of the system. Programmers use
Trapdoor legally to debug and test programs. Trapdoors turn
Fig 2: Block diagram of AES to threats when any dishonest programmers gain illegal
access. Program development and software update activities
The AES encryption algorithm defines numerous should be the first focus of security measures. The operating
transformations that are to be performed on data stored in system that controls the trapdoors is difficult to implement.
an array. The first step of the cipher is to put the data into
an array, after which the cipher transformations are V. ADVANTAGES
repeated over multiple encryption rounds. The first 1. Privacy Protection: Users can search over encrypted data
transformation in the AES encryption cipher is substitution without revealing the actual content of the data or the search
of data using a substitution table. The second
Trapdoor Privacy in Public Key Encryption with Keyword Search

query. This protects sensitive information from unauthorized


access, even by the service provider.

2. Secure Cloud Storage: It enables secure searches on data


stored in the cloud. Users can retrieve relevant information
without exposing the data to potential adversaries, ensuring
confidentiality in cloud-based environments.

3. Selective Access: Trapdoor privacy allows for selective


access to encrypted data. Authorized users possess the
necessary trapdoors to perform searches, while unauthorized Fig 4: Upload a file
entities remain unable to decipher the information.
View file: The data user can view the data/ file which data
4. Efficient Keyword Search: Users can efficiently search owner has uploaded and he can send request to the data
for specific keywords within encrypted datasets without the owner for the file.
need to decrypt the entire dataset. This can significantly
improve search efficiency and reduce computational
overhead.

5. Fine-Grained Access Control: Trapdoor mechanisms can


be designed to support fine-grained access control, enabling
different levels of access for different users based on their
authorization levels.

6. Secure Outsourcing: It facilitates the secure outsourcing


of data storage and processing to third-party providers, such
as cloud services, without compromising data privacy during Fig 5: View File
search operations.
VII. CONCLUSION
VI. RESULTS AND SNAPSHOTS
In this security properties of keyword privacy and trapdoor
Home page: Trapdoor privacy in public key encryption with privacy are essential for the PEKS schemes to be secure
keyword search home page. against offline keyword attack from outsider attacker. Data
continues to be outsourced to cloud environments and
privacy concerns become increasingly significant, the
integration of trapdoor privacy mechanisms becomes
essential. Trapdoor privacy not only safeguards against
unauthorized access but also facilitates secure and efficient
information retrieval, addressing the evolving challenges of
data security in modern computing environments.

VIII. REFERENCES

[1] Chang song Jiang, Zhao Zhang, Kefei Chen, Chunxiang


Fig 3: Home page Xu, “Subversion-resistant public key encryption with
keyword search”, IEEE Transactions on Cloud
Upload file: After login the data owner can upload the file Computing, July-Sept 2023.
to the cloud server.
Trapdoor Privacy in Public Key Encryption with Keyword Search

[2] Sudeep Ghosh, Abhishek Bisht, Ashok Kumar Das, [11] Z. Li, D. Wang, Achieving one-round password-based
“Provably secure public key encryption with keyword authenticated key exchange over lattices, IEEE Trans.
search for data processing “, Volume 139, June 2023, Serv. Comput. 15 (1) (2022) 308–321.
102876.
[12] Y. Lu and J. Li, ‘‘Lightweight public key authenticated
[3] L. Pu, C. Lin, B. Chen and D. He, "User-Friendly Public encryption with keyword search against adaptively-
Key Authenticated Encryption with Keyword Search for chosen targets adversaries for mobile devices’’, IEEE
Industrial Internet of Things," in IEEE Internet of Things Transaction on Mobile Computing, May 4, 2021.
Journal, vol. 10, Aug.1, 2023.
[13] D. Zhang, Q. Fan, H. Qiao and M. Luo, "A Public-key
[4] C. Ge, Z. Liu, W. Susilo, L. Fang, H. Wang, Attribute- Encryption with Multi-keyword Search Scheme for
based encryption with reliable outsourced decryption in Cloud-based Smart Grids," 2021, IEEE Conference.
cloud computing using smart contract, IEEE Trans.
Dependable Secure Comput(2023). [14] Y. Miao, Q. Tong, R. Deng, K.-K.-R. Choo, X. Liu, and
H. Li, ‘‘Verifiable searchable encryption framework
[5] M.H. Noorallahzade, R. Alimoradi, A. Gholami, "A
against insider keyword-guessing attack in cloud
Survey on Public Key Encryption with Keyword Search:
storage’’, IEEE Transaction on Cloud Computing, Apr.
Taxonomy and Methods", International Journal of
21, 2020.
Mathematics and Mathematical Sciences, vol. 2022,
Article ID 3223509, 2022.
[15] S. Zhu and Y. Han, "Generative trapdoors for public key
cryptography based on automatic entropy optimization",
[6] J. W. Byun, H. S. Rhee, H.-A. Park, and D. H. Lee,
in IEEE Transactions, vol. 18, Aug. 2021.
‘‘Offline keyword guessing attacks on recent keyword
search schemes over encrypted data’’, in Proc. Workshop
[16] Yunhong Zhou, Licheng Wang, Yanmei Tian, “Public
Secure Data Manage. Berlin, Germany, Springer, 2022,
key encryption with keyword in cloud”, Information
pp. 75–83.
Theory, Probability and statistics, 2020.
[7] M. Zeng, H. Qian, J. Chen and K. Zhang, "Forward
[17] R. Behnia, M. O. Ozmen and A. A. Yavuz, "Lattice-
Secure Public Key Encryption with Keyword Search for
Based Public Key Searchable Encryption from
Outsourced Cloud Storage," in IEEE Transactions on
Experimental Perspectives," in IEEE Transactions on
Cloud Computing, vol. 10, Jan.-March 2022.
Dependable and Secure Computing, vol. 17, Nov.-Dec.
2020.
[8] H. Lin, F. Gao, H. Zhang, Z. Jin, W. Li and Q. Wen,
"Public Key Encryption with Equality Test Supporting
[18] Zhang, Y. Wang, Y. Li, “Searchable Public Key
Flexible Designated Authorization in Cloud Storage," in
Encryption Supporting Semantic Multi Keywords
IEEE Systems Journal, vol. 16, March 2022.
Search”, IEEE Access 2019.
[9] Q. Fan, D. He, J. Chen, C. Peng, L. Wang, Isoga: An
[19] Y. Wu, J. Hou, J. Liu, W. Zhou and S. Yao, "Novel multi-
isogeny-based quantum-resist searchable encryption
keyword search on encrypted data in the cloud", IEEE
scheme against keyword guessing attacks, IEEE Syst. J,
Access, vol. 7, pp. 31984-31996, 2019.
(2022) 1–12.

[20] B. Qin, H. Cui, X. Zheng and D. Zheng, "Improved


[10] K. Emura, “Generic construction of public-key
security model for public-key authenticated encryption
authenticated encryption with keyword search revisited:
with keyword search" in Provable Security, Cham,
Stronger security and efficient construction, in:
Switzerland Springer, pp. 19-38, 2021.
Proceedings of the 9th ACM on ASIA Public-Key
Cryptography Workshop, APKC ’22, 2022, pp. 39–49.
[21] J. Li, Y. Zhang, J. Ning, X. Huang, G. S. Poh and D.
Wang, "Attribute based encryption with privacy
Trapdoor Privacy in Public Key Encryption with Keyword Search

protection and accountability for cloud IoT", IEEE


Trans. Cloud Comput., Feb. 2020.

[22] Li, J., Zhang, Y., Ning, J., Huang, X., Poh, G.S. and
Wang, D., 2020. Attribute based encryption with privacy
protection and accountability for Cloud IoT. IEEE
Transactions on Cloud Computing.

[23] B. Qin, Y. Chen, Q. Huang, X. Liu, and D. Zheng,


Public-key authen ticated encryption with keyword
search revisited: Security model and constructions, Inf.
Sci., vol. 516, pp. 515528, Apr. 2020.

[24] K. Emura, A. Miyaji, M. S. Rahman, and K. Omote,


Generic construc tions of secure-channel free searchable
encryption with adaptive security, Secur. Commun. Netw.,
vol. 8, no. 8, pp. 15471560, 2020.

You might also like