Skip navigation
Run Run Shaw Library City University of Hong KongRun Run Shaw Library

Please use this identifier to cite or link to this item: http://dspace.cityu.edu.hk/handle/2031/3664
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLi, Chung Ki
dc.date.accessioned2006-10-19T06:55:06Z
dc.date.accessioned2017-09-19T08:51:19Z
dc.date.accessioned2019-02-12T06:53:32Z-
dc.date.available2006-10-19T06:55:06Z
dc.date.available2017-09-19T08:51:19Z
dc.date.available2019-02-12T06:53:32Z-
dc.date.issued2006
dc.identifier.other2006cslck240
dc.identifier.urihttp://144.214.8.231/handle/2031/3664-
dc.description.abstractData encryption is suggested to be used in data storage server such as mail and files system as it can ensure data security and reduce privacy risk. However, this induces that functionalities must be sacrificed for security, such as searching. For instance, if a client wants to retrieve encrypted mails which contain certain keywords from mail server, searching cannot be done without the loss of data confidentiality. That means encrypted data cannot be searched without decrypting it. Actually, there were papers to prove that encrypted data is searchable. One of those was proposed by Song et al. They claimed that their cryptographic schemes had several advantages. First of all, they were provably secure, in the sense that the untrusted server cannot learn anything about the plaintext with giving only the cipher text. Secondly, they provided query isolation for searches, meaning that the untrusted server cannot learn anything about the plaintext besides the search results. Thirdly, they provided controlled searching, so that the untrusted server cannot search for an arbitrary word without the user’s authorization. Fourthly, they support hidden queries, such that the user may ask the untrusted server to search for a secret word without revealing the word to the server. Finally, they are simple, fast and nearly no space and communication overhead. In our project, we implemented a secure email system with Song et al’s idea and tried to proof that whether their searching techniques on encrypted data are work or not.en
dc.format.extent164 bytes
dc.format.mimetypetext/html
dc.rightsThis work is protected by copyright. Reproduction or distribution of the work in any format is prohibited without written permission of the copyright owner.
dc.rightsAccess is restricted to CityU users.
dc.titleSearchable encrypted dataen
dc.contributor.departmentDepartment of Computer Scienceen
dc.description.supervisorWong, Duncan. First Reader: C K Poon. Second Reader: C H Leeen
Appears in Collections:Computer Science - Undergraduate Final Year Projects 

Files in This Item:
File SizeFormat 
fulltext.html164 BHTMLView/Open
Show simple item record


Items in Digital CityU Collections are protected by copyright, with all rights reserved, unless otherwise indicated.

Send feedback to Library Systems
Privacy Policy | Copyright | Disclaimer