Results 141 to 150 of about 22,366 (192)
Efficient Revocable Attribute-Based Keyword Search Against Keyword Guessing Attack
Attribute-Based Keyword Search (ABKS) technology has changed the way data is encrypted and retrieved, enabling data owners to securely store encrypted data in the cloud and allow retrieval only by users who comply with specific access policies.
Chen Zhu +4 more
semanticscholar +3 more sources
Online/offline attribute-based encryption with keyword search against Keyword Guessing Attack
With the exposure of security events in cloud storage, encrypting data before uploading has become the most favorable choice for cloud users, which makes search on encrypted data an important issue. Attribute-based encryption with keyword search (ABKS), which achieves data access control and search on encrypted data at the same time, has risen in ...
Su Hang, Zhiqiang Zhu, Lei Sun
semanticscholar +3 more sources
A secure attribute based keyword search scheme against keyword guessing attack
To provide the privacy of the users who receive some computing services from the cloud, the users must encrypt their documents before outsourcing them to the cloud. Computation on outsourced encrypted data in the cloud rises some complexity to the system specially in the case when an entity would like to find some documents related to a special keyword.
Vahid Yousefipoor +3 more
semanticscholar +3 more sources
Identity-Based Group Encryption With Keyword Search Against Keyword Guessing Attack
Public key Encryption with Keyword Search (PEKS) has emerged as a solution for the receiver to securely search the sender’s encrypted data on the cloud. However, the PEKS scheme is threatened by the Keyword Guessing Attack (KGA), which leaks the receiver’
Wei Wang +4 more
semanticscholar +3 more sources
Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server
The user data stored in an untrusted server, such as the centralized data center or cloud computing server, may be dangerous of eavesdropping if the data format is a plaintext. However, the general ciphertext is difficult to search and thus limited for practical usage.
Chih-Hung Wang, Tai‐Yuan Tu
semanticscholar +4 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Peng Xu, Hai Jin, Qianhong Wu, Wei Wang
semanticscholar +4 more sources
Proxy re-encryption conjunctive keyword search against keyword guessing attack
Public key encryption with keyword search enables users to retrieve keywords from encrypted data, which can protect data confidentiality without losing the search operability. However, it is also vulnerable to keyword guessing attacks. In this paper, we propose a conjunctive keywords searchable encryption with designated tester (dPECK) to prevent the ...
Yang Yang, Maode Ma, Lin Bo-gang
semanticscholar +3 more sources
Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks
Driven by cloud computing technologies, public-key encryption with keyword search (PEKS) is becoming a common practice from aspects of the Industrial Internet of Things, smart healthcare, vehicular social networks, and so on.
Qing Fan +4 more
semanticscholar +3 more sources
In public-key setting, the problem of searching for keywords in encrypted data is handled by the notion of public-key encryption with keyword search (PEKS). An important challenge in designing secure PEKS schemes is providing resistance against variants of an attack known as the keyword guessing attack (KGA).
Mahnaz Noroozi, Ziba Eslami
semanticscholar +3 more sources
Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the contents of the data.
Yang Lu, Jiguo Li
semanticscholar +3 more sources

