Security analysis of Rhee et al.’s public encryption with keyword search schemes: a review

Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan, Weimin Zheng, Shu-Chuan Chu, John Roddick

Research output: Contribution to journalReview articlepeer-review

26 Citations (Scopus)

Abstract

Public key encryption with keyword search (PEKS) provides an efficient way to search encrypted files. Recently, Rhee et al. contributed their knowledge to propose several literatures in this research area. In this paper, we first review their three famous schemes and then summarize the security weaknesses of the three schemes. Finally, we discuss the security problems about Rhee et al. like scheme and remain an open problem.
Original languageEnglish
Pages (from-to)16-25
Number of pages10
JournalJournal of Network Intelligence
Volume3
Issue number1
Publication statusPublished - Feb 2018

Bibliographical note

The Journal of Network Intelligence (JNI) is an open access journal.

Keywords

  • Cryptanalysis
  • Keyword guessing attack
  • Keyword search
  • Searchable encryption

Fingerprint

Dive into the research topics of 'Security analysis of Rhee et al.’s public encryption with keyword search schemes: a review'. Together they form a unique fingerprint.

Cite this