Results 151 to 160 of about 22,366 (192)
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data
A keyword search scheme over encrypted documents allows for remote keyword search of documents by a user in possession of a trapdoor (secret key). A data supplier first uploads encrypted documents on a storage system, and then a user of the storage system searches documents containing keywords while insider (such as administrators of the storage system)
Jin Wook Byun +3 more
semanticscholar +3 more sources
Searchable public key encryption (SPKE) is a beneficial supplement to traditional public key encryption, which offers a viable method to address the retrieval issue over enciphered data.
Yang Lu, Yinxia Sun, Nian Xia, Jiguo Li
semanticscholar +3 more sources
SummaryDesignated server public key encryption with keyword search (dPEKS) removes the secure channel requirement in public key encryption with keyword search (PEKS). With the dPEKS mechanism, a user is able to delegate the search tasks on the ciphertexts sent to him/her to a designated storage server without leaking the corresponding plaintexts ...
Yang Lu, Jiguo Li
semanticscholar +3 more sources
Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing Attacks
To achieve keyword search in secure cloud storage, a public-key encryption with keyword search (PEKS) has been proposed. However, the PEKS is inherently vulnerable to the Keyword Guessing Attack (KGA): Using the public key, anyone including the server can compute the ciphertext of any keyword.
Takanori Saito, Toru Nakanishi
semanticscholar +3 more sources
For multiuser search scenarios over encrypted cloud data, the multiuser searchable encryption (MUSE) technology is a viable solution for incorporating privacy protection and favorable operability functions together.
Peiming Xu +3 more
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Transactions on Emerging Telecommunications Technologies, 2018
AbstractPublic key encryption With keyword search (PEKS) enables a cloud server (CS) to get the search trapdoor to identify ciphertext containing the target keyword without decrypting the ciphertext or knowing the target keyword. With the advent of mobile cloud computing, PEKS has ushered in an era of new development opportunities and new challenges ...
Yaojun Mao +3 more
openaire +2 more sources
AbstractPublic key encryption With keyword search (PEKS) enables a cloud server (CS) to get the search trapdoor to identify ciphertext containing the target keyword without decrypting the ciphertext or knowing the target keyword. With the advent of mobile cloud computing, PEKS has ushered in an era of new development opportunities and new challenges ...
Yaojun Mao +3 more
openaire +2 more sources
Science China Information Sciences, 2016
Attribute-based encryption with keyword search (ABKS) enables data owners to grant their search capabilities to other users by enforcing an access control policy over the outsourced encrypted data. However, existing ABKS schemes cannot guarantee the privacy of the access structures, which may contain some sensitive private information.
Shuo Qiu +3 more
openaire +2 more sources
Attribute-based encryption with keyword search (ABKS) enables data owners to grant their search capabilities to other users by enforcing an access control policy over the outsourced encrypted data. However, existing ABKS schemes cannot guarantee the privacy of the access structures, which may contain some sensitive private information.
Shuo Qiu +3 more
openaire +2 more sources
Abstract As the wave of data breaches continues crashing down on companies, specially for companies that provide cloud storage services, the data security and privacy have become the main concern of most clients that use this kind of services. Certificateless public key encryption with keyword search (CLPEKS) is a novel cryptographic primitives that ...
Mohammed Raouf Senouci +3 more
openalex +2 more sources

