Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes ...Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component. Hence, Certificateless Public Key Cryptography (CLPKC) is efficient to remove such problem. CLPKC is introduced into PEKS, and a general model of Certificateless PEKS (CLPEKS) is formalized. In addition, a practical CLPEKS scheme is constructed with security and efficiency analyses. The proposal is secure channel free, and semantically secure against adaptive chosen keyword attack and keyword guessing attack. To illustrate the superiority, massive experiments are conducted on Enron Email dataset which is famous in information retrieval field. Compared with existed constructions, CLPEKS improves the efficiency in theory and removes the key escrow problem.展开更多
When conducting a literature review,medical authors typically search for relevant keywords in bibliographic databases or on search engines like Google.After selecting the most pertinent article based on the title’s r...When conducting a literature review,medical authors typically search for relevant keywords in bibliographic databases or on search engines like Google.After selecting the most pertinent article based on the title’s relevance and the abstract’s content,they download or purchase the article and cite it in their manuscript.Three major elements influence whether an article will be cited in future manuscripts:the keywords,the title,and the abstract.This indicates that these elements are the“key dissemination tools”for research papers.If these three elements are not determined judiciously by authors,it may adversely affect the manuscript’s retrievability,readability,and citation index,which can negatively impact both the author and the journal.In this article,we share our informed perspective on writing strategies to enhance the searchability and citation of medical articles.These strategies are adopted from the principles of search engine optimization,but they do not aim to cheat or manipulate the search engine.Instead,they adopt a reader-centric content writing methodology that targets well-researched keywords to the readers who are searching for them.Reputable journals,such as Nature and the British Medical Journal,emphasize“online searchability”in their author guidelines.We hope that this article will encourage medical authors to approach manuscript drafting from the perspective of“looking inside-out.”In other words,they should not only draft manuscripts around what they want to convey to fellow researchers but also integrate what the readers want to discover.It is a call-to-action to better understand and engage search engine algorithms,so they yield information in a desired and self-learning manner because the“Cloud”is the new stakeholder.展开更多
Cloud computing facilitates convenient and on-demand network access to a centralized pool of resources.Currently,many users prefer to outsource data to the cloud in order to mitigate the burden of local storage.Howeve...Cloud computing facilitates convenient and on-demand network access to a centralized pool of resources.Currently,many users prefer to outsource data to the cloud in order to mitigate the burden of local storage.However,storing sensitive data on remote servers poses privacy challenges and is currently a source of concern.SE(Searchable Encryption)is a positive way to protect users sensitive data,while preserving search ability on the server side.SE allows the server to search encrypted data without leaking information in plaintext data.The two main branches of SE are SSE(Searchable Symmetric Encryption)and PEKS(Public key Encryption with Keyword Search).SSE allows only private key holders to produce ciphertexts and to create trapdoors for search,whereas PEKS enables a number of users who know the public key to produce ciphertexts but allows only the private key holder to create trapdoors.This article surveys the two main techniques of SE:SSE and PEKS.Different SE schemes are categorized and compared in terms of functionality,efficiency,and security.Moreover,we point out some valuable directions for future work on SE schemes.展开更多
基金This research was supported by the National Science Foundation of China for Funding Projects (61173089,61472298) and National Statistical Science Program of China(2013LZ46).
文摘Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component. Hence, Certificateless Public Key Cryptography (CLPKC) is efficient to remove such problem. CLPKC is introduced into PEKS, and a general model of Certificateless PEKS (CLPEKS) is formalized. In addition, a practical CLPEKS scheme is constructed with security and efficiency analyses. The proposal is secure channel free, and semantically secure against adaptive chosen keyword attack and keyword guessing attack. To illustrate the superiority, massive experiments are conducted on Enron Email dataset which is famous in information retrieval field. Compared with existed constructions, CLPEKS improves the efficiency in theory and removes the key escrow problem.
文摘When conducting a literature review,medical authors typically search for relevant keywords in bibliographic databases or on search engines like Google.After selecting the most pertinent article based on the title’s relevance and the abstract’s content,they download or purchase the article and cite it in their manuscript.Three major elements influence whether an article will be cited in future manuscripts:the keywords,the title,and the abstract.This indicates that these elements are the“key dissemination tools”for research papers.If these three elements are not determined judiciously by authors,it may adversely affect the manuscript’s retrievability,readability,and citation index,which can negatively impact both the author and the journal.In this article,we share our informed perspective on writing strategies to enhance the searchability and citation of medical articles.These strategies are adopted from the principles of search engine optimization,but they do not aim to cheat or manipulate the search engine.Instead,they adopt a reader-centric content writing methodology that targets well-researched keywords to the readers who are searching for them.Reputable journals,such as Nature and the British Medical Journal,emphasize“online searchability”in their author guidelines.We hope that this article will encourage medical authors to approach manuscript drafting from the perspective of“looking inside-out.”In other words,they should not only draft manuscripts around what they want to convey to fellow researchers but also integrate what the readers want to discover.It is a call-to-action to better understand and engage search engine algorithms,so they yield information in a desired and self-learning manner because the“Cloud”is the new stakeholder.
基金This work is supported by Guangxi Cooperative Innovation Center of Cloud Computing and Big Data(No.YD16506)。
文摘Cloud computing facilitates convenient and on-demand network access to a centralized pool of resources.Currently,many users prefer to outsource data to the cloud in order to mitigate the burden of local storage.However,storing sensitive data on remote servers poses privacy challenges and is currently a source of concern.SE(Searchable Encryption)is a positive way to protect users sensitive data,while preserving search ability on the server side.SE allows the server to search encrypted data without leaking information in plaintext data.The two main branches of SE are SSE(Searchable Symmetric Encryption)and PEKS(Public key Encryption with Keyword Search).SSE allows only private key holders to produce ciphertexts and to create trapdoors for search,whereas PEKS enables a number of users who know the public key to produce ciphertexts but allows only the private key holder to create trapdoors.This article surveys the two main techniques of SE:SSE and PEKS.Different SE schemes are categorized and compared in terms of functionality,efficiency,and security.Moreover,we point out some valuable directions for future work on SE schemes.