Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage
Searchable encryption (SE) allows cloud tenants to retrieve encrypted data while preserving data confidentiality securely. Many SE solutions have been designed to improve efficiency and security, but most of them are still susceptible to insider Keyword-Guessing Attacks (KGA), which implies that the internal attackers can guess the candidate keywords ...
Yinbin Miao +5 more
openaire +4 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Fang, Liming +3 more
openaire +6 more sources
Secure searchable public key encryption scheme against keyword guessing attacks
Byun et al. firstly proposed off-line keyword guessing (KG)attacks and proved that some searchable public key encryption (PEKS)schemes are insecure against these attacks. They supposed an open problem on how to construct PEKS schemes secure against keyword guessing attacks. In this letter, we answer this question affirmatively.
Rhee, Hyun Sook +2 more
openaire +5 more sources
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso +4 more
doaj +1 more source
Research on attribute-based encryption with keyword search for cloud storage
To safeguard the sensitive data stored on the cloud and promote the efficiency of data sharing simulta-neously,a secure flexible and efficient attribute-based encryption scheme with keyword search is proposed,which designs an index generation mechanism ...
Zhi-qiang ZHU,Hang SU,Lei SUN,Zuo-hui LI
doaj +3 more sources
Registered Keyword Searchable Encryption Based on SM9
The SM9 algorithm is an Identity-Based Encryption (IBE) algorithm independently made by China. The existing SM9 searchable encryption scheme cannot be effective against insider keyword guessing attacks and violates users’ data privacy.
Haoyu Zhang, Baodong Qin, Dong Zheng
doaj +1 more source
Analysis and Improvement of Searchable Encryption Scheme Based on Composite-Order Bilinear Pairs [PDF]
Searchable encryption,as the core technology of secure search,enables data storage servers to retrieve data under ciphertext.However,the existing searchable encryption scheme without secure channel fail to resist off-line keyword guessing attacks ...
DENG Zhihui, WANG Shaohui, WANG Ping
doaj +1 more source
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms
Recently, attribute-based keyword search (ABKS) schemes have been used to provide fine-grained search over encrypted data on eHealth cloud in the Internet of Things (IoT) platforms.
Lifeng Guo +3 more
doaj +1 more source
Multi-Server Verifiable Attribute-Based Multi-Keyword Sorting Retrieval Scheme [PDF]
To solve the problems of uncontrollable search behavior,untrusted search results and unitary search semantics of existing searchable encryption schemes,this paper proposes a verifiable attribute-based multi-keyword sorting retrieval scheme under multi ...
CAO Suzhen, DU Xialing, WANG Youchen, LIU Xueyan
doaj +1 more source
Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization [PDF]
In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a ...
Tang, Qiang
core +5 more sources

