Results 171 to 180 of about 22,366 (192)
Some of the next articles are maybe not open access.
Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes
2021Public key encryption with keyword search (PEKS) is a practical cryptographic paradigm that enables one to search for the encrypted data without compromising the security of the original data. It provides a promising solution to the encrypted data retrieval issue in public key cryptosystems. As a combination of PEKS and proxy re-encryption (PRE), proxy
Xuanang Yu +3 more
openaire +1 more source
IEEE Transactions on Cloud Computing, 2021
Cloud storage enables users to outsource data to storage servers and retrieve target data efficiently. Some of the outsourced data are very sensitive and should be prevented for any leakage. Generally, if users conventionally encrypt the data, searching is impeded. Public-key encryption with keyword search (PEKS) resolves this tension.
Yuan Zhang +4 more
openaire +1 more source
Cloud storage enables users to outsource data to storage servers and retrieve target data efficiently. Some of the outsourced data are very sensitive and should be prevented for any leakage. Generally, if users conventionally encrypt the data, searching is impeded. Public-key encryption with keyword search (PEKS) resolves this tension.
Yuan Zhang +4 more
openaire +1 more source
International Conference on Advanced Cloud and Big Data
The Industrial Internet of Things (IIoT) represents a promising application of the Internet of Things (IoT) in industry, offering significant potential for enhancing manufacturing efficiency and enabling smart production. In the context of the IIoT, data
Hong Zhong +5 more
semanticscholar +1 more source
The Industrial Internet of Things (IIoT) represents a promising application of the Internet of Things (IoT) in industry, offering significant potential for enhancing manufacturing efficiency and enabling smart production. In the context of the IIoT, data
Hong Zhong +5 more
semanticscholar +1 more source
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
Information Sciences, 2017zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Huang, Qiong, Li, Hongbo
openaire +1 more source
IEEE Transactions on Mobile Computing
Data security is becoming increasingly critical as outsourced data services flourish. An effective solution for ensuring data confidentiality in the cloud is attribute-based searchable encryption (ABSE).
Liqing Chen +4 more
semanticscholar +1 more source
Data security is becoming increasingly critical as outsourced data services flourish. An effective solution for ensuring data confidentiality in the cloud is attribute-based searchable encryption (ABSE).
Liqing Chen +4 more
semanticscholar +1 more source
Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search
IEEE Transactions on Information Forensics and SecurityData confidentiality, a fundamental security element for dependable cloud storage, has been drawing widespread concern. Public-key encryption with keyword search (PEKS) has emerged as a promising approach for privacy protection while enabling efficient ...
Yongliang Xu +5 more
semanticscholar +1 more source
Verifiable Conjunctive Field Keyword Searchable Encryption With Aggregate Keys for E-Health Cloud
IEEE Internet of Things JournalWith the rapid proliferation of Internet of Things (IoT)-enabled healthcare systems, sensitive data, such as electronic health records (EHRs) are increasingly outsourced to semi-trusted e-health clouds, raising critical concerns about privacy and ...
Xihui Lu +3 more
semanticscholar +1 more source
Secure and Efficient Keyword-Based Threat Detection
International Journal for Research in Applied Science and Engineering TechnologyPublic Key Encryption with Keyword Search (PEKS) is a common cryptographic primitive that facilitates secure keyword search over encrypted data so that the keywords hidden inside are concealed from unauthorized parties.
Nagarathna C
semanticscholar +1 more source

