International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 116

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015


Searching Keyword Using Public-Key Ciphertexts with Hidden Structures

K. Maheshwari, S. Nithya


Abstract: Searching as fast as possible without sacrificing semantic security of the encrypted s using Searchable Public-key Ciphertexts with Hidden Structures (SPCHS). In this all searchable ciphertexts are structured by hidden relations, and with trapdoor corresponding to a, search algorithm provide guidance to find all matching ciphertexts efficiently. Construct SPCHS from scratch in which ciphertexts have a hidden star like structure. It is semantically secure in the Random Oracle (RO) Model. Search complexity is depends on the actual number of ciphertexts containing queried rather than the number of all ciphertexts. Finally we propose, Generic SPCHS is constructed from Identity Based Encryption (IBE) and collision-free full-identity malleable Identity Based Key Encapsulation Mechanism (IBKEM). In this collision-free full-identity malleable IBKEM instances are semantically secure and anonymous in the RO and standard models.


Keywords: Public key searchable encryption, Semantic security, Identity Based Encapsulation Mechanism IBKEM, Identity Based Encryption IBE


Edition: Volume 4 Issue 11, November 2015,


Pages: 859 - 862


How to Cite this Article?

K. Maheshwari, S. Nithya, "Searching Keyword Using Public-Key Ciphertexts with Hidden Structures", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV151303, Volume 4 Issue 11, November 2015, 859 - 862

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Public'

Downloads: 0

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 12, December 2021

Pages: 820 - 822

Research on Public Opinion Security under Blockchain Architecture

Wang Hong-Mei

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article

Similar Articles with Keyword 'key'

Downloads: 119 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article

Similar Articles with Keyword 'searchable'

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2704 - 2706

Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption

Minakshi B. Shingan, Sanchika A. Bajpai

Share this Article

Downloads: 107

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 988 - 992

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Vina M. Lomte, Gauri S. Patil

Share this Article

Similar Articles with Keyword 'encryption'

Downloads: 119 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Semantic'

Downloads: 7

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 113 - 116

Semantic Segmentation using Deep Learning Approaches - A Study

Salim Ahmed Ali, Dr. B. G. Prasad

Share this Article

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2297 - 2299

Measuring and Comparing Semantic Structure of Ontology

Nirmitee N. Kurhekar, Prof. L. J. Sankpal

Share this Article

Similar Articles with Keyword 'security'

Downloads: 119 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 134

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Similar Articles with Keyword 'Identity'

Downloads: 82

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Similar Articles with Keyword 'Based'

Downloads: 151 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'Encapsulation'

Downloads: 120

Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 304 - 308

A Comparative Analysis of Detection and Prevention of Wormhole attacks in Mobile Ad-hoc Networks

Sushant S. Bahekar, Prashant Panse

Share this Article

Downloads: 143

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 605 - 610

Survey on Object Oriented Mutation Testing

Snehal R. Takawale, Sandeep Kadam

Share this Article

Similar Articles with Keyword 'Mechanism'

Downloads: 156 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 12, December 2021

Pages: 820 - 822

Research on Public Opinion Security under Blockchain Architecture

Wang Hong-Mei

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 119 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'IBE'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this Article
Top