Results 141 to 150 of about 3,657 (190)
Some of the next articles are maybe not open access.

Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage

IEEE Transactions on Cloud Computing, 2021
Cloud storage enables users to outsource data to storage servers and retrieve target data efficiently. Some of the outsourced data are very sensitive and should be prevented for any leakage. Generally, if users conventionally encrypt the data, searching is impeded. Public-key encryption with keyword search (PEKS) resolves this tension.
Yuan Zhang   +4 more
openaire   +1 more source

Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server

Journal of Shanghai Jiaotong University (Science), 2014
The user data stored in an untrusted server, such as the centralized data center or cloud computing server, may be dangerous of eavesdropping if the data format is a plaintext. However, the general ciphertext is difficult to search and thus limited for practical usage.
Chih-hung Wang, Tai-yuan Tu
openaire   +1 more source

An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks

Journal of Systems Architecture, 2021
Abstract As the wave of data breaches continues crashing down on companies, specially for companies that provide cloud storage services, the data security and privacy have become the main concern of most clients that use this kind of services. Certificateless public key encryption with keyword search (CLPEKS) is a novel cryptographic primitives that ...
Mohammed Raouf Senouci   +3 more
openaire   +1 more source

Conjunctive Keywords Searchable Encryption Scheme Against Inside Keywords Guessing Attack from Lattice

2020
Public-key encryption with conjunctive keywords search (PECKS) is an extension of public-key encryption with keywords search (PEKS), which can realize the efficient search of the encrypted data stored in the cloud server and keep the privacy of these data during the search phase.
Xiaoling Yu, Chungen Xu, Bennian Dou
openaire   +1 more source

Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack

IEEE Transactions on Computers, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Peng   +3 more
openaire   +2 more sources

Constructing PEKS schemes secure against keyword guessing attacks is possible?

Computer Communications, 2009
Byun et al. suggested keyword guessing attacks and showed that some PEKS (public-key encryption with keyword search) schemes are not secure to keyword guessing attacks, when the number of possible keywords is bounded by some polynomial. Abdalla et al. showed that robust PEKS schemes should satisfy consistency which ensures the PEKS schemes fulfil their
Ik Rae Jeong   +3 more
openaire   +1 more source

Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices

Transactions on Emerging Telecommunications Technologies, 2018
AbstractPublic key encryption With keyword search (PEKS) enables a cloud server (CS) to get the search trapdoor to identify ciphertext containing the target keyword without decrypting the ciphertext or knowing the target keyword. With the advent of mobile cloud computing, PEKS has ushered in an era of new development opportunities and new challenges ...
Yaojun Mao   +3 more
openaire   +1 more source

A Survey on Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage

Advances in Computational Intelligence in Materials Science, 2023
A key component of data security in cloud computing systems is encryption. Encryption might not be enough, though, to shield sensitive data from hostile intrusions. One such attack is the keyword guessing attack, in which an attacker uses a variety of techniques to attempt to decipher a term from the encrypted data.
Subha R   +5 more
openaire   +1 more source

Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack

Science China Information Sciences, 2016
Attribute-based encryption with keyword search (ABKS) enables data owners to grant their search capabilities to other users by enforcing an access control policy over the outsourced encrypted data. However, existing ABKS schemes cannot guarantee the privacy of the access structures, which may contain some sensitive private information.
Shuo Qiu   +3 more
openaire   +1 more source

Constructing designated server public key encryption with keyword search schemes withstanding keyword guessing attacks

International Journal of Communication Systems, 2018
SummaryDesignated server public key encryption with keyword search (dPEKS) removes the secure channel requirement in public key encryption with keyword search (PEKS). With the dPEKS mechanism, a user is able to delegate the search tasks on the ciphertexts sent to him/her to a designated storage server without leaking the corresponding plaintexts ...
Yang Lu, Jiguo Li
openaire   +1 more source

Home - About - Disclaimer - Privacy