MORGAN, B., HAMADA, M., ABDELFADEL, G. (2011). SECUIRTY USING THE EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH SYSTEM. JES. Journal of Engineering Sciences, 39(No 3), 607-624. doi: 10.21608/jesaun.2011.127654
B. MORGAN; M. HAMADA; G. ABDELFADEL. "SECUIRTY USING THE EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH SYSTEM". JES. Journal of Engineering Sciences, 39, No 3, 2011, 607-624. doi: 10.21608/jesaun.2011.127654
MORGAN, B., HAMADA, M., ABDELFADEL, G. (2011). 'SECUIRTY USING THE EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH SYSTEM', JES. Journal of Engineering Sciences, 39(No 3), pp. 607-624. doi: 10.21608/jesaun.2011.127654
MORGAN, B., HAMADA, M., ABDELFADEL, G. SECUIRTY USING THE EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH SYSTEM. JES. Journal of Engineering Sciences, 2011; 39(No 3): 607-624. doi: 10.21608/jesaun.2011.127654
SECUIRTY USING THE EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH SYSTEM
1Assistance Professor, Communication and Electronics Department, Helwan University
2Professor, Communication and Electronics Department, Helwan University.
Abstract
Efficient Public key encryption with key word search (EPEKS) enables user Alice to send a secret key to a server that will enable the server to locate all encrypted messages containing the keyword, but learn nothing else. We have already published a previous paper explaining this scheme the Efficient Public Key Encryption with Keyword Search (EPEKS). In this paper, we focused on the relationship between the security and (EPEKS). Firstly we briefly review the construction of this scheme (EPEKS). (EPEKS) doesn’t base on Identity Based Encryption or pairing which was used in the construction of the (PEKS) that proposed in Boneh’s paper and other papers; it is based on Public Key Cryptosystem. Secondly, we explained and compared between previous published papers and clarified the relationship between security and (EPEKS). Finally, we mentioned the encryption mechanisms regarding the system.