Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 615679, 10 pages
Research Article

A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure

Department of Computer Software Engineering, Soonchunhyang University, Asan-si, Chungcheongnam-do, Republic of Korea

Received 31 August 2013; Accepted 22 October 2013; Published 12 February 2014

Academic Editors: H. Cheng and H.-E. Tseng

Copyright © 2014 Sun-Ho Lee and Im-Yeong Lee. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 44–55, Berkeley, Calif, USA, May 2000. View at Scopus
  2. E. J. Goh, “Secure Indexes,” ePrint Crpytography Archive, 2004.
  3. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88, Alexandria, Va, USA, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2004.
  5. D. Boneh and B. Waters, “Conjunctive, subset and range queries on encrypted data,” in Proceedings of the 4th Theory of Cryptography Conference, Amsterdam, The Netherlands, 2007.
  6. Y. H. Hwang and P. J. Lee, “Public key encryption with conjunctive keyword search and its extension to a multi-user system,” in Proceedings of the 1st International Conference on Pairing-Based Cryptography, Tokyo, Japan, 2007.
  7. F. Bao, R. H. Deng, X. Ding, and Y. Yang, “Private query on encrypted data in multi-user settings,” in Proceedings of the 4th International Conference on Information Security Practice and Experience, Sydney, Australia, 2008.
  8. S. Kamara and K. Lauter, “Cryptographic outsourcing storage,” in Proceedings of Workshops on Financial Cryptography and Data Security, pp. 25–28, Canary Islands, Spain, 2010.
  9. M. Ion, G. Russello, and B. Crispo, “Enforcing multi-user access policies to encrypted cloud databases,” in Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY '11), pp. 175–177, Trento, Italy, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. B. Zhang and F. Zhang, “An efficient public key encryption with conjunctive-subset keywords search,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 262–267, 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. Y. Yang, “Towards multi-user private keyword search for cloud computing,” in Proceedings of the IEEE 4th International Conference on Cloud Computing (CLOUD '11), pp. 758–759, Singapore, July 2011. View at Publisher · View at Google Scholar · View at Scopus
  12. J. Shao, Z. Cao, X. Liang, and H. Lin, “Proxy re-encryption with keyword search,” Information Sciences, vol. 180, no. 13, pp. 2576–2587, 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. X. Chen and Y. Li, “Efficient proxy re-encryption with private keyword searching in untrusted storage,” International Journal of Computer Network and Information Security, vol. 3, no. 2, 2011. View at Google Scholar
  14. X. A. Wang, X. Huang, X. Yang, L. Liu, and X. Wu, “Further observation on proxy re-encryption with keyword search,” Journal of Systems and Software, vol. 85, no. 3, pp. 643–654, 2012. View at Publisher · View at Google Scholar · View at Scopus