• Home
  • Browse
    • Current Issue
    • By Issue
    • By Author
    • By Subject
    • Author Index
    • Keyword Index
  • Journal Info
    • About Journal
    • Aims and Scope
    • Editorial Board
    • Publication Ethics
    • Peer Review Process
  • Guide for Authors
  • Submit Manuscript
  • Contact Us
 
  • Login
  • Register
Home Articles List Article Information
  • Save Records
  • |
  • Printable Version
  • |
  • Recommend
  • |
  • How to cite Export to
    RIS EndNote BibTeX APA MLA Harvard Vancouver
  • |
  • Share Share
    CiteULike Mendeley Facebook Google LinkedIn Twitter
JES. Journal of Engineering Sciences
arrow Articles in Press
arrow Current Issue
Journal Archive
Volume Volume 53 (2025)
Volume Volume 52 (2024)
Volume Volume 51 (2023)
Volume Volume 50 (2022)
Volume Volume 49 (2021)
Volume Volume 48 (2020)
Volume Volume 47 (2019)
Volume Volume 46 (2018)
Volume Volume 45 (2017)
Volume Volume 44 (2016)
Volume Volume 43 (2015)
Volume Volume 42 (2014)
Volume Volume 41 (2013)
Volume Volume 40 (2012)
Volume Volume 39 (2011)
Issue No 6
Issue No 5
Issue No 4
Issue No 3
Issue No 2
Issue No 1
Volume Volume 38 (2010)
Volume Volume 37 (2009)
Volume Volume 36 (2008)
Volume Volume 35 (2007)
Volume Volume 34 (2006)
MORGAN, B., HAMADA, M., ABDELFADEL, G. (2011). SECUIRTY USING THE EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH SYSTEM. JES. Journal of Engineering Sciences, 39(No 3), 607-624. doi: 10.21608/jesaun.2011.127654
B. MORGAN; M. HAMADA; G. ABDELFADEL. "SECUIRTY USING THE EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH SYSTEM". JES. Journal of Engineering Sciences, 39, No 3, 2011, 607-624. doi: 10.21608/jesaun.2011.127654
MORGAN, B., HAMADA, M., ABDELFADEL, G. (2011). 'SECUIRTY USING THE EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH SYSTEM', JES. Journal of Engineering Sciences, 39(No 3), pp. 607-624. doi: 10.21608/jesaun.2011.127654
MORGAN, B., HAMADA, M., ABDELFADEL, G. SECUIRTY USING THE EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH SYSTEM. JES. Journal of Engineering Sciences, 2011; 39(No 3): 607-624. doi: 10.21608/jesaun.2011.127654

SECUIRTY USING THE EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH SYSTEM

Article 9, Volume 39, No 3, May and June 2011, Page 607-624  XML PDF (212.99 K)
Document Type: Research Paper
DOI: 10.21608/jesaun.2011.127654
View on SCiNiTO View on SCiNiTO
Authors
B. MORGAN; M. HAMADA1; G. ABDELFADEL2
1Assistance Professor, Communication and Electronics Department, Helwan University
2Professor, Communication and Electronics Department, Helwan University.
Abstract
Efficient Public key encryption with key word search (EPEKS) enables
user Alice to send a secret key to a server that will enable the server to
locate all encrypted messages containing the keyword, but learn nothing
else. We have already published a previous paper explaining this scheme
the Efficient Public Key Encryption with Keyword Search (EPEKS). In
this paper, we focused on the relationship between the security and
(EPEKS). Firstly we briefly review the construction of this scheme
(EPEKS). (EPEKS) doesn’t base on Identity Based Encryption or pairing
which was used in the construction of the (PEKS) that proposed in
Boneh’s paper and other papers; it is based on Public Key Cryptosystem.
Secondly, we explained and compared between previous published
papers and clarified the relationship between security and (EPEKS).
Finally, we mentioned the encryption mechanisms regarding the system.
Keywords
EPEKS; Encryption email; Hash function; Mail server; Refreshing keywords; Security
Main Subjects
Electrical Engineering, Computer Engineering and Electrical power and machines engineering.
Statistics
Article View: 145
PDF Download: 378
Home | Glossary | News | Aims and Scope | Sitemap
Top Top

Journal Management System. Designed by NotionWave.