Proxy re-encryption with keyword search: New definitions and algorithms with proofs

Citation

Yau, W. C. and Goi, B. M. and Heng, S. H. and Phan, R. C. (2011) Proxy re-encryption with keyword search: New definitions and algorithms with proofs. International Journal of Security and Its Applications, 5 (2). pp. 75-90. ISSN 1738-9984

[img] Text
35.pdf
Restricted to Repository staff only

Download (618kB)

Abstract

We propose a new definition for searchable proxy re-encryption scheme (Re-PEKS), define the first known searchable proxy re-encryption scheme with a designated tester (RedPEKS),and then give concrete constructions of both Re-PEKS and Re-dPEKS schemes that are secure in the random oracle model, along with the proofs.

Item Type: Article
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Information Science and Technology (FIST)
Depositing User: Ms Rosnani Abd Wahab
Date Deposited: 15 Jan 2014 04:07
Last Modified: 15 Jan 2014 04:07
URII: http://shdl.mmu.edu.my/id/eprint/4854

Downloads

Downloads per month over past year

View ItemEdit (login required)