SECUIRTY USING THE EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH SYSTEM | ||||
JES. Journal of Engineering Sciences | ||||
Article 9, Volume 39, No 3, May and June 2011, Page 607-624 PDF (212.99 K) | ||||
Document Type: Research Paper | ||||
DOI: 10.21608/jesaun.2011.127654 | ||||
View on SCiNiTO | ||||
Authors | ||||
B. MORGAN; M. HAMADA1; G. ABDELFADEL2 | ||||
1Assistance Professor, Communication and Electronics Department, Helwan University | ||||
2Professor, Communication and Electronics Department, Helwan University. | ||||
Abstract | ||||
Efficient Public key encryption with key word search (EPEKS) enables user Alice to send a secret key to a server that will enable the server to locate all encrypted messages containing the keyword, but learn nothing else. We have already published a previous paper explaining this scheme the Efficient Public Key Encryption with Keyword Search (EPEKS). In this paper, we focused on the relationship between the security and (EPEKS). Firstly we briefly review the construction of this scheme (EPEKS). (EPEKS) doesn’t base on Identity Based Encryption or pairing which was used in the construction of the (PEKS) that proposed in Boneh’s paper and other papers; it is based on Public Key Cryptosystem. Secondly, we explained and compared between previous published papers and clarified the relationship between security and (EPEKS). Finally, we mentioned the encryption mechanisms regarding the system. | ||||
Keywords | ||||
EPEKS; Encryption email; Hash function; Mail server; Refreshing keywords; Security | ||||
Statistics Article View: 67 PDF Download: 244 |
||||