نمایش مختصر رکورد

dc.contributor.authorShiraly, Danialen_US
dc.contributor.authorPakniat, Nasrollahen_US
dc.contributor.authorEslami, Zibaen_US
dc.date.accessioned1402-08-19T17:05:40Zfa_IR
dc.date.accessioned2023-11-10T17:05:40Z
dc.date.available1402-08-19T17:05:40Zfa_IR
dc.date.available2023-11-10T17:05:40Z
dc.date.issued2023-10-01en_US
dc.date.issued1402-07-09fa_IR
dc.date.submitted2023-09-17en_US
dc.date.submitted1402-06-26fa_IR
dc.identifier.citationShiraly, Danial, Pakniat, Nasrollah, Eslami, Ziba. (2023). Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting. The ISC International Journal of Information Security, 15(3), 1-16. doi: 10.22042/isecure.2023.416676.1014en_US
dc.identifier.issn2008-2045
dc.identifier.issn2008-3076
dc.identifier.urihttps://dx.doi.org/10.22042/isecure.2023.416676.1014
dc.identifier.urihttps://www.isecure-journal.com/article_180427.html
dc.identifier.urihttps://iranjournals.nlai.ir/handle/123456789/1037714
dc.description.abstractPublic key encryption with keyword search (PEKS) is a cryptographic primitive designed for performing secure search operations over encrypted data stored on untrusted cloud servers. However, in some applications of cloud computing, there is a hierarchical access-privilege setup among users so that upper-level users should be able to monitor data used by lower-level ones in the hierarchy. To support such situations, Wang et al. introduced the notion of hierarchical ID-based searchable encryption. However, Wang et al.'s construction suffers from a serious security problem. To provide a PEKS scheme that securely supports hierarchical structures, Li et al. introduced the notion of hierarchical public key encryption with keyword search (HPEKS). However, Li et al.'s HPEKS scheme is established on traditional public key infrastructure (PKI) which suffers from costly certificate management problem. To address these issues, in this paper, we consider designated-server HPEKS in identity-based setting. We introduce the notion of designated-server hierarchical identity-based searchable encryption (dHIBSE) and provide a formal definition of its security model. We then propose a dHIBSE scheme and prove its security under our model. Finally, we provide performance analysis as well as comparisons with related schemes to show the overall superiority of our dHIBSE scheme.en_US
dc.languageEnglish
dc.language.isoen_US
dc.publisherIranian Society of Cryptologyen_US
dc.relation.ispartofThe ISC International Journal of Information Securityen_US
dc.relation.isversionofhttps://dx.doi.org/10.22042/isecure.2023.416676.1014
dc.subjectcloud computingen_US
dc.subjectHierarchical Identity-Based Searchable Encryptionen_US
dc.subjectIdentity-Based Encryptionen_US
dc.subjectSearchable Encryptionen_US
dc.titleDesignated-Server Hierarchical Searchable Encryption in Identity-Based Settingen_US
dc.typeTexten_US
dc.typeResearch Articleen_US
dc.contributor.departmentDepartment of Computer and Data Science, Shahid Beheshti University, Tehran, Iranen_US
dc.contributor.departmentInformation Science Research Center, Iranian Research Institute for Information Science and Technology (IranDoc), Tehran, Iranen_US
dc.contributor.departmentDepartment of Computer and Data Science, Shahid Beheshti University, Tehran, Iranen_US
dc.citation.volume15
dc.citation.issue3
dc.citation.spage1
dc.citation.epage16


فایل‌های این مورد

فایل‌هااندازهقالبمشاهده

فایلی با این مورد مرتبط نشده است.

این مورد در مجموعه‌های زیر وجود دارد:

نمایش مختصر رکورد