A Blockchain-Based Authentication Mechanism for Enhanced Security. [PDF]
McCabe C, Mohideen AIC, Singh R.
europepmc +1 more source
Improving the proof of "Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms". [PDF]
Wang S +5 more
europepmc +1 more source
Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage. [PDF]
Wang S, Gao T, Zhang Y.
europepmc +1 more source
Knowledge assessment tools in atopic dermatitis patient education: a scoping review. [PDF]
Khela J, Wilken B, Asai Y.
europepmc +1 more source
DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets.
Aqeel S +6 more
europepmc +1 more source
Related searches:
Proxy re-encryption conjunctive keyword search against keyword guessing attack
2013 Computing, Communications and IT Applications Conference (ComComAp), 2013Public key encryption with keyword search enables users to retrieve keywords from encrypted data, which can protect data confidentiality without losing the search operability. However, it is also vulnerable to keyword guessing attacks. In this paper, we propose a conjunctive keywords searchable encryption with designated tester (dPECK) to prevent the ...
null Yang Yang +2 more
openaire +1 more source
A secure attribute based keyword search scheme against keyword guessing attack
2016 8th International Symposium on Telecommunications (IST), 2016To provide the privacy of the users who receive some computing services from the cloud, the users must encrypt their documents before outsourcing them to the cloud. Computation on outsourced encrypted data in the cloud rises some complexity to the system specially in the case when an entity would like to find some documents related to a special keyword.
Vahid Yousefipoor +3 more
openaire +1 more source
Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes
2021Public key encryption with keyword search (PEKS) is a practical cryptographic paradigm that enables one to search for the encrypted data without compromising the security of the original data. It provides a promising solution to the encrypted data retrieval issue in public key cryptosystems. As a combination of PEKS and proxy re-encryption (PRE), proxy
Xuanang Yu +3 more
openaire +1 more source
Online/offline attribute-based encryption with keyword search against Keyword Guessing Attack
2017 3rd IEEE International Conference on Computer and Communications (ICCC), 2017With the exposure of security events in cloud storage, encrypting data before uploading has become the most favorable choice for cloud users, which makes search on encrypted data an important issue. Attribute-based encryption with keyword search (ABKS), which achieves data access control and search on encrypted data at the same time, has risen in ...
Hang Su, Zhiqiang Zhu, Lei Sun
openaire +1 more source

