Proxy Re-Encryption Scheme Supporting Keyword Search in Email System
To authorize others to deal with encrypted mails and enable the search of encrypted mails in an encrypted email system,this paper proposes a proxy re-encryption scheme that supports keyword search for email systems.In this scheme,searchable encryption technology is used to search encrypted mails,and...
| Published in: | Jisuanji gongcheng |
|---|---|
| Main Author: | NIU Shufen, CHEN Lixia, LIU Wenke, WANG Caifen, DU Xiaoni |
| Format: | Article |
| Language: | English |
| Published: |
Editorial Office of Computer Engineering
2020-06-01
|
| Subjects: | |
| Online Access: | https://www.ecice06.com/fileup/1000-3428/PDF/20200619.pdf |
Similar Items
Triple receiver public key encryption cryptosystem
by: Liutao ZHAO, et al.
Published: (2020-12-01)
by: Liutao ZHAO, et al.
Published: (2020-12-01)
Triple receiver public key encryption cryptosystem
by: ZHAO Liutao, WANG Caiqun, et al.
Published: (2020-12-01)
by: ZHAO Liutao, WANG Caiqun, et al.
Published: (2020-12-01)
Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Cai-fen WANG, et al.
Published: (2017-10-01)
by: Cai-fen WANG, et al.
Published: (2017-10-01)
Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Cai-fen WANG, et al.
Published: (2017-10-01)
by: Cai-fen WANG, et al.
Published: (2017-10-01)
Data Sharing Scheme of Electronic Medical Record Based on Proxy Re-Encryption
by: NIU Shufen, LIU Wenke, CHEN Lixia, DU Xiaoni
Published: (2021-06-01)
by: NIU Shufen, LIU Wenke, CHEN Lixia, DU Xiaoni
Published: (2021-06-01)
Publicly Verifiable Multi-stage Secret Sharing on General Access Structures
by: SONG Yun, WANG Ningning, XIAO Menglin, SHAO Zhiyi
Published: (2023-05-01)
by: SONG Yun, WANG Ningning, XIAO Menglin, SHAO Zhiyi
Published: (2023-05-01)
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
by: Yanhua LU, et al.
Published: (2020-02-01)
by: Yanhua LU, et al.
Published: (2020-02-01)
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
by: Yanhua LU, et al.
Published: (2020-02-01)
by: Yanhua LU, et al.
Published: (2020-02-01)
A New Short Signature Scheme with Random Oracle from Bilinear Pairings
by: Sedat Akleylek, et al.
Published: (2023-06-01)
by: Sedat Akleylek, et al.
Published: (2023-06-01)
Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud
by: Yuqin Sun, et al.
Published: (2023-05-01)
by: Yuqin Sun, et al.
Published: (2023-05-01)
A Practical Searchable Encryption Scheme Based on Connection Keywords
by: LUO Yunpeng, ZHU Nitong, MAO Ciwei, CHENG Jinxue, XU Chungen
Published: (2020-02-01)
by: LUO Yunpeng, ZHU Nitong, MAO Ciwei, CHENG Jinxue, XU Chungen
Published: (2020-02-01)
ID-based transitive signature schemes without random oracle
by: MA Xiao-long1, et al.
Published: (2010-01-01)
by: MA Xiao-long1, et al.
Published: (2010-01-01)
ID-based transitive signature schemes without random oracle
by: MA Xiao-long1, et al.
Published: (2010-01-01)
by: MA Xiao-long1, et al.
Published: (2010-01-01)
Efficient certificateless sequential multi-signature scheme
by: Yan-lin QIN, et al.
Published: (2013-07-01)
by: Yan-lin QIN, et al.
Published: (2013-07-01)
Efficient certificateless sequential multi-signature scheme
by: Yan-lin QIN, et al.
Published: (2013-07-01)
by: Yan-lin QIN, et al.
Published: (2013-07-01)
Universally composable secure multiparty computation protocol with fairness
by: You-liang TIAN, et al.
Published: (2014-02-01)
by: You-liang TIAN, et al.
Published: (2014-02-01)
Universally composable secure multiparty computation protocol with fairness
by: You-liang TIAN, et al.
Published: (2014-02-01)
by: You-liang TIAN, et al.
Published: (2014-02-01)
Proposal to Complex DES Security Using Diffie Hellman Injection
by: Shatha habeeb Jafar
Published: (2011-04-01)
by: Shatha habeeb Jafar
Published: (2011-04-01)
A Pairing Free Provable Public Key Dual Receiver Encryption Scheme
by: Eman Abouelkheir, et al.
Published: (2024-01-01)
by: Eman Abouelkheir, et al.
Published: (2024-01-01)
Developed Protocol for Key Exchange Based on Irreducible Polynomial
by: Abdul Monem S. Rahma, et al.
Published: (2012-06-01)
by: Abdul Monem S. Rahma, et al.
Published: (2012-06-01)
SIDH Hybrid Schemes with Classical Component Based on the Discrete Logarithm Problem over Finite Field Extension
by: Michał Wroński, et al.
Published: (2020-09-01)
by: Michał Wroński, et al.
Published: (2020-09-01)
Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial
by: Hala B. Abdul Wahab, et al.
Published: (2016-06-01)
by: Hala B. Abdul Wahab, et al.
Published: (2016-06-01)
A mutual and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Huifang JI, et al.
Published: (2020-04-01)
by: Huifang JI, et al.
Published: (2020-04-01)
A mutual and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Huifang JI, et al.
Published: (2020-04-01)
by: Huifang JI, et al.
Published: (2020-04-01)
New Counterexamples to Sequential Composition Adaptive Insecurity
by: Liqing Yu
Published: (2025-01-01)
by: Liqing Yu
Published: (2025-01-01)
Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model
by: Mariusz Jurkiewicz
Published: (2021-12-01)
by: Mariusz Jurkiewicz
Published: (2021-12-01)
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability
by: Junling Guo, et al.
Published: (2022-06-01)
by: Junling Guo, et al.
Published: (2022-06-01)
An edge cloud and Fibonacci-Diffie-Hellman encryption scheme for secure printer data transmission
by: Yiqin Bao, et al.
Published: (2024-01-01)
by: Yiqin Bao, et al.
Published: (2024-01-01)
COMPARATIVE ANALYSIS OF MOD-ECDH ALGORITHM WITH VARIOUS ALGORITHMS
by: O Sri Nagesh, et al.
Published: (2020-06-01)
by: O Sri Nagesh, et al.
Published: (2020-06-01)
Signcryption Scheme for Certificateless Identity Hiding Under 5G Network
by: Lü Jia, CAO Suzhen, KOU Bangyan, ZHANG Zhiqiang, HAN Longbo
Published: (2020-03-01)
by: Lü Jia, CAO Suzhen, KOU Bangyan, ZHANG Zhiqiang, HAN Longbo
Published: (2020-03-01)
Efficient ID-based certificateless signature scheme
by: LIU Jing-wei, et al.
Published: (2008-01-01)
by: LIU Jing-wei, et al.
Published: (2008-01-01)
Efficient ID-based certificateless signature scheme
by: LIU Jing-wei, et al.
Published: (2008-01-01)
by: LIU Jing-wei, et al.
Published: (2008-01-01)
ADDING PERFECT FORWARD SECRECY TO KERBEROS
by: Wameedh Nazar Flayyih
Published: (2010-04-01)
by: Wameedh Nazar Flayyih
Published: (2010-04-01)
Certificateless-based efficient aggregate signature scheme with universal designated verifier
by: Yu-lei ZHANG, et al.
Published: (2015-02-01)
by: Yu-lei ZHANG, et al.
Published: (2015-02-01)
Certificateless-based efficient aggregate signature scheme with universal designated verifier
by: Yu-lei ZHANG, et al.
Published: (2015-02-01)
by: Yu-lei ZHANG, et al.
Published: (2015-02-01)
Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud
by: Nagappan Mageshkumar, et al.
Published: (2023-01-01)
by: Nagappan Mageshkumar, et al.
Published: (2023-01-01)
Leakage-resilient certificateless signcryption scheme
by: Yan-lin QIN, et al.
Published: (2017-11-01)
by: Yan-lin QIN, et al.
Published: (2017-11-01)
Leakage-resilient certificateless signcryption scheme
by: Yan-lin QIN, et al.
Published: (2017-11-01)
by: Yan-lin QIN, et al.
Published: (2017-11-01)
Hybrid Algorithms Use Monomials in Encryption
by: Awni M. Gaftan, et al.
Published: (2020-03-01)
by: Awni M. Gaftan, et al.
Published: (2020-03-01)
Enhancing secrecy using hybrid elliptic curve cryptography and Diffie Hellman key exchange approach and Young's double slit experiment optimizer based optimized cross layer in multihop wireless network
by: Bhagappa, et al.
Published: (2024-02-01)
by: Bhagappa, et al.
Published: (2024-02-01)
Similar Items
-
Triple receiver public key encryption cryptosystem
by: Liutao ZHAO, et al.
Published: (2020-12-01) -
Triple receiver public key encryption cryptosystem
by: ZHAO Liutao, WANG Caiqun, et al.
Published: (2020-12-01) -
Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Cai-fen WANG, et al.
Published: (2017-10-01) -
Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Cai-fen WANG, et al.
Published: (2017-10-01) -
Data Sharing Scheme of Electronic Medical Record Based on Proxy Re-Encryption
by: NIU Shufen, LIU Wenke, CHEN Lixia, DU Xiaoni
Published: (2021-06-01)
