Results 171 to 180 of about 22,366 (192)
Some of the next articles are maybe not open access.

Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes

2021
Public key encryption with keyword search (PEKS) is a practical cryptographic paradigm that enables one to search for the encrypted data without compromising the security of the original data. It provides a promising solution to the encrypted data retrieval issue in public key cryptosystems. As a combination of PEKS and proxy re-encryption (PRE), proxy
Xuanang Yu   +3 more
openaire   +1 more source

Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage

IEEE Transactions on Cloud Computing, 2021
Cloud storage enables users to outsource data to storage servers and retrieve target data efficiently. Some of the outsourced data are very sensitive and should be prevented for any leakage. Generally, if users conventionally encrypt the data, searching is impeded. Public-key encryption with keyword search (PEKS) resolves this tension.
Yuan Zhang   +4 more
openaire   +1 more source

Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation

open access: closedScience China Information Sciences, 2017
Lixue Sun   +4 more
openalex   +2 more sources

Server-Assisted Certificateless Searchable Encryption Scheme for Industrial Internet of Things Against Keyword Guessing Attacks

International Conference on Advanced Cloud and Big Data
The Industrial Internet of Things (IIoT) represents a promising application of the Internet of Things (IoT) in industry, offering significant potential for enhancing manufacturing efficiency and enabling smart production. In the context of the IIoT, data
Hong Zhong   +5 more
semanticscholar   +1 more source

An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks

Information Sciences, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Huang, Qiong, Li, Hongbo
openaire   +1 more source

Partially Hidden Policy Attribute-Based Multi-Keyword Searchable Encryption With Verification and Revocation

IEEE Transactions on Mobile Computing
Data security is becoming increasingly critical as outsourced data services flourish. An effective solution for ensuring data confidentiality in the cloud is attribute-based searchable encryption (ABSE).
Liqing Chen   +4 more
semanticscholar   +1 more source

Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search

IEEE Transactions on Information Forensics and Security
Data confidentiality, a fundamental security element for dependable cloud storage, has been drawing widespread concern. Public-key encryption with keyword search (PEKS) has emerged as a promising approach for privacy protection while enabling efficient ...
Yongliang Xu   +5 more
semanticscholar   +1 more source

Verifiable Conjunctive Field Keyword Searchable Encryption With Aggregate Keys for E-Health Cloud

IEEE Internet of Things Journal
With the rapid proliferation of Internet of Things (IoT)-enabled healthcare systems, sensitive data, such as electronic health records (EHRs) are increasingly outsourced to semi-trusted e-health clouds, raising critical concerns about privacy and ...
Xihui Lu   +3 more
semanticscholar   +1 more source

Secure and Efficient Keyword-Based Threat Detection

International Journal for Research in Applied Science and Engineering Technology
Public Key Encryption with Keyword Search (PEKS) is a common cryptographic primitive that facilitates secure keyword search over encrypted data so that the keywords hidden inside are concealed from unauthorized parties.
Nagarathna C
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy