Abstract
We propose a new definition for searchable proxy re-encryption scheme (Re-PEKS), define the first known searchable proxy re-encryption scheme with a designated tester (Re-dPEKS), and then give concrete constructions of both Re-PEKS and Re-dPEKS schemes that are secure in the random oracle model.
Original language | English |
---|---|
Title of host publication | Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010 |
Pages | 149-160 |
Number of pages | 12 |
DOIs | |
Publication status | Published - 2010 |
Externally published | Yes |
Event | International Conference on Security Technology/International Conference on Disaster Recovery and Business Continuity 2010 - Jeju Island, Korea, South Duration: 13 Dec 2010 → 15 Dec 2010 https://link.springer.com/book/10.1007/978-3-642-17610-4 (Proceedings) |
Publication series
Name | Communications in Computer and Information Science |
---|---|
Volume | 122 CCIS |
ISSN (Print) | 1865-0929 |
Conference
Conference | International Conference on Security Technology/International Conference on Disaster Recovery and Business Continuity 2010 |
---|---|
Abbreviated title | SerTech/DRBC 2010 |
Country/Territory | Korea, South |
City | Jeju Island |
Period | 13/12/10 → 15/12/10 |
Internet address |
|
Keywords
- public key encryption with keyword search
- random oracle model
- Searchable proxy re-encryption