Results 11 to 20 of about 22,366 (192)

Secure searchable public key encryption scheme against keyword guessing attacks

open access: bronzeIEICE Electronics Express, 2009
Byun et al. firstly proposed off-line keyword guessing (KG)attacks and proved that some searchable public key encryption (PEKS)schemes are insecure against these attacks. They supposed an open problem on how to construct PEKS schemes secure against keyword guessing attacks. In this letter, we answer this question affirmatively.
Hyun Sook Rhee   +2 more
openalex   +4 more sources

SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks [PDF]

open access: green, 2019
A number of searchable encryption schemes have been widely proposed to solve the search problem in ciphertext domain. However, most existing searchable encryption schemes are vulnerable to keyword guessing attacks. During keyword guessing attacks, with the help of the cloud, an adversary will learn what keyword a given trapdoor is searching for, which ...
Hongyuan Chen   +3 more
openalex   +4 more sources

A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks [PDF]

open access: yesSensors, 2019
Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data
Binrui Zhu   +5 more
doaj   +2 more sources

Public key encryption with keyword search secure against keyword guessing attacks without random oracle

open access: closedInformation Sciences, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Liming Fang   +3 more
openalex   +5 more sources

Comment on “Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups”

open access: yesIEEE Access
The public key encryption with keyword search (PEKS) scheme is a cryptographic primitive that allows a cloud server to search for a ciphertext without knowing the corresponding keyword used in the search.
Koon-Ming Chan   +3 more
doaj   +2 more sources

A Secure Data-Sharing Model Resisting Keyword Guessing Attacks in Edge–Cloud Collaboration Scenarios

open access: goldElectronics
In edge–cloud collaboration scenarios, data sharing is a critical technological tool, yet smart devices encounter significant challenges in ensuring data-sharing security. Attribute-based keyword search (ABKS) is employed in these contexts to facilitate fine-grained access control over shared data, allowing only users with the necessary privileges to ...
Ye Li   +4 more
openalex   +2 more sources

A secure data sharing model against keyword guessing attacks in edge-cloud collaboration scenarios [PDF]

open access: green
Abstract In the context of edge cloud collaboration scenarios, data sharing is an essential technological tool, and smart devices face significant challenges when it comes to data sharing security. In scenarios involving edge clouds, attribute-based keyword search (ABKS) is utilized to enable fine-grained access control over shared data and ...
Qikun Zhang   +4 more
openalex   +2 more sources

Lattice-Based Searchable Encryption Scheme Against Inside Keywords Guessing Attack

open access: diamondComputers, Materials & Continua, 2020
Xiaoling Yu   +3 more
openalex   +2 more sources

Efficient k-Resilient Public Key Authenticated Encryption with Keyword Search

open access: yesJournal of Cybersecurity and Privacy
Traditional encryption prioritises confidentiality but complicates search operations, requiring decryption before searches can be conducted. The public key encryption with keyword search (PEKS) scheme addresses this limitation by enabling authorised ...
Koon-Ming Chan   +3 more
doaj   +2 more sources

Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review

open access: yesIEEE Access, 2022
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting. The PEKS scheme suffers from a major drawback which is keyword guessing attack.
Koon-Ming Chan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy