Results 1 to 10 of about 179 (144)
SPKSE: secure public key searchable encryption withstand keyword guessing attacks [PDF]
Public Key Searchable Encryption (PKSE) enables secure keyword searches over encrypted data, making it a critical tool for outsourced storage systems.
Dongxian Shi +3 more
doaj +3 more sources
Public key encryption with keyword search (PEKS) allows users to perform keyword searches of ciphertext on untrusted cloud storage servers, protecting data privacy while sharing data. However, it faces several security problems in practical applications.
Yingying Tang +4 more
doaj +2 more sources
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks [PDF]
Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data
Binrui Zhu +5 more
doaj +2 more sources
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack
Vahid Yousefipoor +3 more
doaj +1 more source
ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack
Abstract In order to guarantee security and privacy of sensitive data, attribute-based keyword search (ABKS) enables data owners to upload their encrypted data to cloud servers, and authorizes intended data users to retrieve it. Meanwhile, ABKS outsources heavy search work to cloud servers, which makes ABKS adaptive to mobile computing environment ...
Jiguo Li +4 more
openaire +1 more source
Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting. The PEKS scheme suffers from a major drawback which is keyword guessing attack.
Koon-Ming Chan +3 more
doaj +1 more source
In the cloud, users prefer to store their sensitive data in encrypted form. Searching keywords over encrypted data without loss of data confidentiality is an important issue. In 2004, Boneh et al.
Junling Guo +4 more
doaj +1 more source
An Efficient Public Key Searchable Encryption Scheme for Mobile Smart Terminal
With the wide application of the mobile smart terminals, the data privacy protection of the mobile smart terminals stored in the cloud is more and more important.
Ningbin Yang, Shumei Xu, Zhou Quan
doaj +1 more source
Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography.
Lidong Han +4 more
doaj +1 more source
Multi-Server Multi-Keyword Searchable Encryption Scheme for Designated User [PDF]
The existing searchable encryption schemes are limited in the efficiency of ciphertext retrieval and accuracy of search results,and generally do not support the verification of data user identity.To address the problems,a multi-server multi-keyword ...
DOU Fengge, CAO Suzhen, MA Jiajia, DING Xiaohui, WANG Caifen
doaj +1 more source

