Proceedings of the International Conference on Computer, Information Technology and Intelligent Computing (CITIC 2022)

Email Plugin Suite for k-Resilient Identity-Based Encryption and Searchable Encryption

Authors
Kah-Wai Chew1, Swee-Huay Heng1, *
1Faculty of Information Science and Technology, Multimedia University, Melaka, Malaysia
*Corresponding author. Email: shheng@mmu.edu.my
Corresponding Author
Swee-Huay Heng
Available Online 27 December 2022.
DOI
10.2991/978-94-6463-094-7_10How to use a DOI?
Keywords
k-resilient; Identity-based encryption; Searchable encryption; Email plugin
Abstract

Nowadays, most of the companies use their preferred email platform to perform their daily tasks such as exchanging of messages and sharing of documents. However, it is quite often to hear the news that someone’s email account is being hacked. The malicious intention of the hackers is to hijack the users’ personal information or company documents. Thus, cryptography plays an important role to provide more a secure email platform. Identity-based encryption (IBE) is a public key cryptosystem that uses a unique identifier such as email address or IP address to generate the user public key and it relies on a trusted third party to generate the corresponding user private key. As compared to conventional public key infrastructure, users now no longer need to distribute their public keys to others. Meanwhile, searching over encrypted emails could be a challenging task. In order to overcome this, the concept of public key encryption with keyword search (PEKS) was introduced to enable searching for the encrypted keywords without revealing anything about the original email. This research focuses on implementing and integrating both IBE and PEKS with encryption and searching functionalities into an email platform via an email plugin. More precisely, this project is to design an email plugin suite using k-resilient identity-based encryption and k-resilient searchable encryption in order to provide a more secure email platform. The performance analysis shows promising result.

Copyright
© 2022 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the International Conference on Computer, Information Technology and Intelligent Computing (CITIC 2022)
Series
Atlantis Highlights in Computer Sciences
Publication Date
27 December 2022
ISBN
10.2991/978-94-6463-094-7_10
ISSN
2589-4900
DOI
10.2991/978-94-6463-094-7_10How to use a DOI?
Copyright
© 2022 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Kah-Wai Chew
AU  - Swee-Huay Heng
PY  - 2022
DA  - 2022/12/27
TI  - Email Plugin Suite for k-Resilient Identity-Based Encryption and Searchable Encryption
BT  - Proceedings of the International Conference on Computer, Information Technology and Intelligent Computing (CITIC 2022)
PB  - Atlantis Press
SP  - 120
EP  - 132
SN  - 2589-4900
UR  - https://doi.org/10.2991/978-94-6463-094-7_10
DO  - 10.2991/978-94-6463-094-7_10
ID  - Chew2022
ER  -