Public key encryption with keyword search (PEKS) provides an efficient way to search encrypted files. Recently, Rhee et al. contributed their knowledge to propose several literatures in this research area. In this paper, we first review their three famous schemes and then summarize the security weaknesses of the three schemes. Finally, we discuss the security problems about Rhee et al. like scheme and remain an open problem.
|Number of pages||10|
|Journal||Journal of Network Intelligence|
|Publication status||Published - Feb 2018|
Bibliographical noteThe Journal of Network Intelligence (JNI) is an open access journal.
- Keyword guessing attack
- Keyword search
- Searchable encryption