Skip to main navigation Skip to search Skip to main content

Security analysis of Rhee et al.’s public encryption with keyword search schemes: A review

  • Tsu Yang Wu
  • , Chien Ming Chen
  • , King Hang Wang
  • , Jeng Shyang Pan
  • , Weimin Zheng*
  • , Shu Chuan Chu
  • , John F. Roddick
  • *Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

27 Citations (Scopus)

Abstract

Public key encryption with keyword search (PEKS) provides an efficient way to search encrypted files. Recently, Rhee et al. contributed their knowledge to propose several literatures in this research area. In this paper, we first review their three famous schemes and then summarize the security weaknesses of the three schemes. Finally, we discuss the security problems about Rhee et al. like scheme and remain an open problem.

Original languageEnglish
Pages (from-to)16-25
Number of pages10
JournalJournal of Network Intelligence
Volume3
Issue number1
Publication statusPublished - Feb 2018

User-Defined Keywords

  • Cryptanalysis
  • Keyword guessing attack
  • Keyword search
  • Searchable encryption

Fingerprint

Dive into the research topics of 'Security analysis of Rhee et al.’s public encryption with keyword search schemes: A review'. Together they form a unique fingerprint.

Cite this