• Home
  • Browse
    • Current Issue
    • By Issue
    • By Author
    • By Subject
    • Author Index
    • Keyword Index
  • Journal Info
    • About Journal
    • Aims and Scope
    • Editorial Board
    • Publication Ethics
    • Peer Review Process
  • Guide for Authors
  • Submit Manuscript
  • Contact Us
 
  • Login
  • Register
Home Articles List Article Information
  • Save Records
  • |
  • Printable Version
  • |
  • Recommend
  • |
  • How to cite Export to
    RIS EndNote BibTeX APA MLA Harvard Vancouver
  • |
  • Share Share
    CiteULike Mendeley Facebook Google LinkedIn Twitter
JES. Journal of Engineering Sciences
arrow Articles in Press
arrow Current Issue
Journal Archive
Volume Volume 53 (2025)
Volume Volume 52 (2024)
Volume Volume 51 (2023)
Volume Volume 50 (2022)
Volume Volume 49 (2021)
Volume Volume 48 (2020)
Volume Volume 47 (2019)
Volume Volume 46 (2018)
Volume Volume 45 (2017)
Volume Volume 44 (2016)
Volume Volume 43 (2015)
Volume Volume 42 (2014)
Volume Volume 41 (2013)
Volume Volume 40 (2012)
Volume Volume 39 (2011)
Volume Volume 38 (2010)
Issue No 6
Issue No 4
Issue No 3
Issue No 2
Issue No 1
Volume Volume 37 (2009)
Volume Volume 36 (2008)
Volume Volume 35 (2007)
Volume Volume 34 (2006)
MORGAN, B., HAMADA, M., ABDEFADEL, G. (2010). EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH. JES. Journal of Engineering Sciences, 38(No 3), 749-761. doi: 10.21608/jesaun.2010.124396
B. MORGAN; M. HAMADA; G. ABDEFADEL. "EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH". JES. Journal of Engineering Sciences, 38, No 3, 2010, 749-761. doi: 10.21608/jesaun.2010.124396
MORGAN, B., HAMADA, M., ABDEFADEL, G. (2010). 'EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH', JES. Journal of Engineering Sciences, 38(No 3), pp. 749-761. doi: 10.21608/jesaun.2010.124396
MORGAN, B., HAMADA, M., ABDEFADEL, G. EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH. JES. Journal of Engineering Sciences, 2010; 38(No 3): 749-761. doi: 10.21608/jesaun.2010.124396

EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH

Article 10, Volume 38, No 3, May and June 2010, Page 749-761  XML PDF (255.54 K)
Document Type: Research Paper
DOI: 10.21608/jesaun.2010.124396
View on SCiNiTO View on SCiNiTO
Authors
B. MORGAN; M. HAMADA1; G. ABDEFADEL2
1Assistance Professor, Communication and Electronics Department, Helwan University
2Professor, Communication and Electronics Department, Helwan University
Abstract
Public key encryption with key word search (PEKS) enables user Alice to send a secret key to a server that will enable the server to locate all encrypted messages containing the keyword, but learn nothing else. In this paper, we propose a new scheme the Efficient Public Key Encryption with Keyword Search (EPEKS). Firstly we explained the construction of new scheme (EPEKS). (EPEKS) doesn’t base on Identity Based Encryption or pairing which was used in the construction of the (PEKS) that proposed in Boneh’s paper and other papers; it is based on Public Key Cryptosystem. Secondly, we proposed provably secure (EPEKS) scheme that refreshes keywords and processes multiple keywords. Finally, we described the security of the new scheme by using Cryptographic algorithm and Hash function.
Keywords
Public key encryption; RSA; Encryption email; Hash function; Mail server; Refreshing keywords
Main Subjects
Electrical Engineering, Computer Engineering and Electrical power and machines engineering.
Statistics
Article View: 134
PDF Download: 361
Home | Glossary | News | Aims and Scope | Sitemap
Top Top

Journal Management System. Designed by NotionWave.