Results 1 to 10 of about 672,157 (285)

Searchable Symmetric Encryption with Forward Search Privacy [PDF]

open access: yesIEEE Transactions on Dependable and Secure Computing, 2021
Searchable symmetric encryption (SSE) has been widely applied in the encrypted database for queries in practice. Although SSE is powerful and feature-rich, it is always plagued by information leaks. Some recent attacks point out that forward privacy which disallows leakage from update operations, now becomes a basic requirement for any newly designed
Jin Li   +6 more
openaire   +2 more sources

Research on privacy protection of intelligent construction [PDF]

open access: yesMATEC Web of Conferences, 2023
With the application of new generation intelligent technologies such as big data, cloud computing and numerical simulation in engineering, the level of intelligent construction has been gradually improved.
Shang Jingshi, Li Xiuwen, Wang Qingyong
doaj   +1 more source

Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption

open access: yesIEEE Access, 2023
Dynamic searchable symmetric encryption (DSSE) enables users to outsource their data while retaining the capability to search and update on the encrypted database. Although various DSSE schemes have been proposed to achieve higher efficiency and stronger
Hyundo Yoon   +5 more
doaj   +1 more source

DESSE: A Dynamic Efficient Forward Searchable Encryption Scheme

open access: yesIEEE Access, 2020
Under the cloud computing environment, Searchable Symmetric Encryption (SSE) is an effective method to solve the problem of encrypted data retrieval, and helps to protect the users' privacy.
Xu Wanshan, Zhang Jianbiao, Yilin Yuan
doaj   +1 more source

An RFID Grouping-proof Protocol with Privacy Protection and Forward Security [PDF]

open access: yesJisuanji gongcheng, 2020
The Radio Frequency Identification(RFID) grouping-proof protocol is used to verify whether there are multiple tags,because in actual scenario,these tags are used for the identification of one object.However,due to the simple structure and limited ...
SHI Zhicai, WANG Yihan, ZHANG Xiaomei, CHEN Jiwei, CHEN Shanshan
doaj   +1 more source

Efficient Dynamic Searchable Encryption with Forward Privacy [PDF]

open access: yesProceedings on Privacy Enhancing Technologies, 2018
Abstract Searchable symmetric encryption (SSE) enables a client to perform searches over its outsourced encrypted files while preserving privacy of the files and queries. Dynamic schemes, where files can be added or removed, leak more information than static schemes.
Papamanthou, Charalampos   +3 more
openaire   +2 more sources

Pindex: Private multi-linked index for encrypted document retrieval.

open access: yesPLoS ONE, 2021
Cryptographic cloud storage is used to make optimal use of the cloud storage infrastructure to outsource sensitive and mission-critical data. The continuous growth of encrypted data outsourced to cloud storage requires continuous updating.
A John Prakash, B Lydia Elizabeth
doaj   +1 more source

SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search

open access: yesApplied Sciences, 2020
Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries ...
Hyundo Yoon   +5 more
doaj   +1 more source

A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing

open access: yesIEEE Access, 2020
Data sharing through the cloud is flourishing with the development of cloud computing technology. The new wave of technology will also give rise to new security challenges, particularly the data confidentiality in cloud-based sharing applications ...
Biwen Chen   +4 more
doaj   +1 more source

Privacy‐aware PKI model with strong forward security [PDF]

open access: yesInternational Journal of Intelligent Systems, 2020
With the development of network technology, privacy protection and users anonymity become a new research hotspot. The existing blockchain privacy‐aware public key infrastructure (PKI) model can ensure the privacy of users in the authentication process to a certain extent, but there are still problems of the storage and leakage of users' keys.
Li, Fengyin   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy