Sattenapalli Hari Babu, B. Nagaraju Naik


The go through able file encryption (SE) plan is really a technology to include security protection and favorable operability functions together, which could play a huge role within the e-health record system. A digital health record product is a singular application which will bring great convenience in healthcare. Within this paper, we introduce a singular cryptographic primitive named as conjunctive keyword investigate with designated tester and timing enabled proxy re-file encryption function, which is a type of a closing-dependent SE plan. We design a singular hunt for able file encryption plan supporting secure conjunctive keyword hunt and approved delegation function. In contrast to existing schemes, the work is capable of timing enabled proxy re-file encryption with effective delegation revocation. The security and privacy from the sensitive private information would be the major concerns from the users that could hinder further development and broadly adoption from the systems. We formulate a method model along with a security model nonetheless suggested Re-deck plan to exhibit that it's a competent plan demonstrated secure within the standard model. The comparison and extensive simulations show it features a low computation and storage left overhead. It might enable patients to depute partial access legal rights to other people to function comb functions bygone their records in a couple of minutes age. The breadth of your time-frame notwithstanding assign to scout and decode the delegator’s encrypted documents might be controlled.


Searchable Encryption; Time Control; Conjunctive Keywords; Designated Tester; E-Health; Resist Offline Keyword Guessing Attack;


L. Fang, W. Susilo, C. Ge, and J. Wang, “Public key encryption with keyword search secure against keyword guessing attacks without random oracle,” Inf. Sci., vol. 238, pp. 221–241, Jul. 2013.

J. W. Byun and D. H. Lee, “On a security model of conjunctive keyword search over encrypted relational database,” J. Syst. Softw., vol. 84, no. 8, pp. 1364–1372, 2011.

Q. Liu, G. Wang, and J. Wu, “Time-based proxy re-encryption scheme for secure data sharing in a cloud environment,” Inf. Sci., vol. 258, pp. 355–370, Feb. 2014.

D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Ro¸su, and M. Steiner, “Highly-scalable searchable symmetric encryption with support for Boolean queries,” in Advances in Cryptology, Berlin, Germany: Springer, 2013, pp. 353–373.

X. A. Wang, X. Huang, X. Yang, L. Liu, and X. Wu, “Further observation on proxy re-encryption with keyword search,” J. Syst. Softw., vol. 85, no. 3, pp. 643–654, 2012.

Yang and Maude Ma, Senior Member, IEEE, “Conjunctive Keyword Search With DesignatedTester and Timing Enabled Proxy Re-EncryptionFunction for E-Health Clouds”, ieee transactions on information forensics and security, vol. 11, no. 4, april 2016.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2021, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at