Results 161 to 170 of about 22,366 (192)
Public-key encryption with conjunctive keywords search (PECKS) is an extension of public-key encryption with keywords search (PEKS), which can realize the efficient search of the encrypted data stored in the cloud server and keep the privacy of these data during the search phase.
Xiaoling Yu, Chungen Xu, Bennian Dou
openalex +2 more sources
Searchable public key encryption (SPKE) is a useful public key cryptographic primitive that allows a user to perform keyword searches over publicly encrypted messages on an untrusted storage server while guaranteeing the privacy of the original messages ...
Yang Lu, Jiguo Li, Yichen Zhang
openalex +2 more sources
Constructing PEKS schemes secure against keyword guessing attacks is possible?
Byun et al. suggested keyword guessing attacks and showed that some PEKS (public-key encryption with keyword search) schemes are not secure to keyword guessing attacks, when the number of possible keywords is bounded by some polynomial. Abdalla et al. showed that robust PEKS schemes should satisfy consistency which ensures the PEKS schemes fulfil their
Ik Rae Jeong +3 more
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cluster Computing, 2018
Due to the tremendous benefits of cloud computing, an increasing number of health care providers tend to deploy the electronic medical record (EMR) storages and application services into cloud. To protect patients’ privacy, sensitive EMRs have to be encrypted before being uploaded to cloud.
Yang Lu, Jiguo Li
openaire +2 more sources
Due to the tremendous benefits of cloud computing, an increasing number of health care providers tend to deploy the electronic medical record (EMR) storages and application services into cloud. To protect patients’ privacy, sensitive EMRs have to be encrypted before being uploaded to cloud.
Yang Lu, Jiguo Li
openaire +2 more sources
Abstract Public key encryption with keyword search (PEKS) is a useful paradigm that enables a user to delegate searching capabilities on publicly encrypted data to an untrusted third party without revealing the data contents. In 2013, Fang et al.
Yang Lu, Gang Wang, Jiguo Li
openalex +2 more sources
Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks
Machine learning is more closely linked to data privacy and has obtained rapid development in recent years. As for data privacy, searchable encryption (SE) is widely used as a ciphertext search technology, protecting the privacy of users. However, existing schemes usually support single keyword search, so the remote cloud server (CS) may return some ...
Zhenwei Chen +5 more
openalex +2 more sources
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
International Journal of Computer Mathematics, 2013The first searchable public key encryption scheme with designated testers dPEKS known to be secure against keyword guessing attacks was due to Rhee et al. [H.S. Rhee, W. Susilo, and H.J. Kim, Secure searchable public key encryption scheme against keyword guessing attacks, IEICE Electron. Express 65 2009, pp. 237–243].
Yau, Wei-Chuen +3 more
openaire +3 more sources
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes
The Public Key Encryption with Keyword Search Scheme (PEKS) was first proposed by Boneh et al. in 2004. This scheme solves the problem of searching on data that is encrypted using a public key setting. Recently, Baek et al. proposed a Secure Channel Free Public Key Encryption with Keyword Search (SCF-PEKS) scheme that removes the secure channel for ...
Wei‐Chuen Yau +2 more
openalex +2 more sources
Comments on “Identity-Based Group Encryption With Keyword Search Against Keyword Guessing Attack”
Takeshi YOSHIDA, Keita Emura
openalex +2 more sources

