Abstract
Although most of the existing encryption system takes the privacy issues of storing data into consider, the reveal of user access pattern is inevitable during the e-mail filtering. Therefore, how to protect the private data in the process of spam filtering becomes one of the urgent problems to be solved. Combined with two filtering techniques which are based on keyword and blacklist respectively, this paper achieves the goal of sorting and filtering spams. Meanwhile, given the privacy issues in sorting and filtering the spams, the paper is based on an experimental project, the Pairing Based Cryptography, which is performed by Stanford University to achieve the e-mail encryption program. It adopts a searchable public key encryption in the process of sorting and filtering, which needs no decryption and can realize searching and matching operations. By this method, it fully protects the privacy and access patterns of the mail receiver from disclosing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cui, G., Xu, P., Lei, F.: Improved prototype scheme of PETKS and its expansion. Comput. Sci. 36(3), 58–60 (2009)
Meng, X.: Analysis of privacy proetction of electornic mails. J. Northeast Agric. Univ. (Soc. Sci. Ed.) 1, 37 (2009)
Yang, H., Sun, S., Li, H.: Research on bilinear Diffie-Hellman problem. J. Sichuan Univ. (Eng. Sci. Ed.) 1(38), 137–141 (2006)
Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008. LNCS, vol. 5072, pp. 1249–1259. Springer, Heidelberg (2008). doi:10.1007/978-3-540-69839-5_96
Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24676-3_30
Zhang, B., Wang, X.: Public key encryption schemes search with keyword. Comput. Eng. 36(06), 155–157 (2010)
Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-insulated public key cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65–82. Springer, Heidelberg (2002). doi:10.1007/3-540-46035-7_5
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. Siam J. Comput. 32(3), 586–615 (2003)
Acknowledgements
This work is supported by the National Natural Science Foundation of China with the Grant No. 61573157, the Fund of Natural Science Foundation of Guangdong Province of China with the Grant No. 2014A030313454.
This work was jointly supported by Natural Science Foundation of Guangdong Province of China (2015A030313408).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, K., Xiong, L., Wen, Z. (2016). An Improved Search Algorithm About Spam Firewall. In: Gong, M., Pan, L., Song, T., Zhang, G. (eds) Bio-inspired Computing – Theories and Applications. BIC-TA 2016. Communications in Computer and Information Science, vol 682. Springer, Singapore. https://doi.org/10.1007/978-981-10-3614-9_12
Download citation
DOI: https://doi.org/10.1007/978-981-10-3614-9_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3613-2
Online ISBN: 978-981-10-3614-9
eBook Packages: Computer ScienceComputer Science (R0)