Results 151 to 160 of about 3,657 (190)
Some of the next articles are maybe not open access.
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data
2006A keyword search scheme over encrypted documents allows for remote keyword search of documents by a user in possession of a trapdoor (secret key). A data supplier first uploads encrypted documents on a storage system, and then a user of the storage system searches documents containing keywords while insider (such as administrators of the storage system)
Jin Wook Byun +3 more
openaire +1 more source
Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing Attacks
2017 Fifth International Symposium on Computing and Networking (CANDAR), 2017To achieve keyword search in secure cloud storage, a public-key encryption with keyword search (PEKS) has been proposed. However, the PEKS is inherently vulnerable to the Keyword Guessing Attack (KGA): Using the public key, anyone including the server can compute the ciphertext of any keyword.
Takanori Saito, Toru Nakanishi
openaire +1 more source
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes
2008The Public Key Encryption with Keyword Search Scheme (PEKS) was first proposed by Boneh et al. in 2004. This scheme solves the problem of searching on data that is encrypted using a public key setting. Recently, Baek et al. proposed a Secure Channel Free Public Key Encryption with Keyword Search (SCF-PEKS) scheme that removes the secure channel for ...
Wei-Chuen, Yau +2 more
openaire +1 more source
Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks
2020Machine learning is more closely linked to data privacy and has obtained rapid development in recent years. As for data privacy, searchable encryption (SE) is widely used as a ciphertext search technology, protecting the privacy of users. However, existing schemes usually support single keyword search, so the remote cloud server (CS) may return some ...
Zhenwei Chen +5 more
openaire +1 more source
Journal of Ambient Intelligence and Humanized Computing, 2019
In public-key setting, the problem of searching for keywords in encrypted data is handled by the notion of public-key encryption with keyword search (PEKS). An important challenge in designing secure PEKS schemes is providing resistance against variants of an attack known as the keyword guessing attack (KGA).
Mahnaz Noroozi, Ziba Eslami
openaire +1 more source
In public-key setting, the problem of searching for keywords in encrypted data is handled by the notion of public-key encryption with keyword search (PEKS). An important challenge in designing secure PEKS schemes is providing resistance against variants of an attack known as the keyword guessing attack (KGA).
Mahnaz Noroozi, Ziba Eslami
openaire +1 more source
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
Information Sciences, 2017zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Huang, Qiong, Li, Hongbo
openaire +1 more source
Information Sciences, 2019
Abstract Public key encryption with keyword search (PEKS) is a useful paradigm that enables a user to delegate searching capabilities on publicly encrypted data to an untrusted third party without revealing the data contents. In 2013, Fang et al.
Yang Lu, Gang Wang, Jiguo Li
openaire +1 more source
Abstract Public key encryption with keyword search (PEKS) is a useful paradigm that enables a user to delegate searching capabilities on publicly encrypted data to an untrusted third party without revealing the data contents. In 2013, Fang et al.
Yang Lu, Gang Wang, Jiguo Li
openaire +1 more source
Cluster Computing, 2018
Due to the tremendous benefits of cloud computing, an increasing number of health care providers tend to deploy the electronic medical record (EMR) storages and application services into cloud. To protect patients’ privacy, sensitive EMRs have to be encrypted before being uploaded to cloud.
Yang Lu, Jiguo Li
openaire +1 more source
Due to the tremendous benefits of cloud computing, an increasing number of health care providers tend to deploy the electronic medical record (EMR) storages and application services into cloud. To protect patients’ privacy, sensitive EMRs have to be encrypted before being uploaded to cloud.
Yang Lu, Jiguo Li
openaire +1 more source
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
International Journal of Computer Mathematics, 2013The first searchable public key encryption scheme with designated testers dPEKS known to be secure against keyword guessing attacks was due to Rhee et al. [H.S. Rhee, W. Susilo, and H.J. Kim, Secure searchable public key encryption scheme against keyword guessing attacks, IEICE Electron. Express 65 2009, pp. 237–243].
Yau, Wei-Chuen +3 more
openaire +2 more sources
Integrative oncology: Addressing the global challenges of cancer prevention and treatment
Ca-A Cancer Journal for Clinicians, 2022Jun J Mao,, Msce +2 more
exaly

