Results 11 to 20 of about 3,665 (174)

Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage

open access: yesIEEE Transactions on Cloud Computing, 2022
Searchable encryption (SE) allows cloud tenants to retrieve encrypted data while preserving data confidentiality securely. Many SE solutions have been designed to improve efficiency and security, but most of them are still susceptible to insider Keyword-Guessing Attacks (KGA), which implies that the internal attackers can guess the candidate keywords ...
Yinbin Miao   +5 more
openaire   +4 more sources

Public key encryption with keyword search secure against keyword guessing attacks without random oracle

open access: yesInformation Sciences, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Fang, Liming   +3 more
openaire   +6 more sources

Secure searchable public key encryption scheme against keyword guessing attacks

open access: yesIEICE Electronics Express, 2009
Byun et al. firstly proposed off-line keyword guessing (KG)attacks and proved that some searchable public key encryption (PEKS)schemes are insecure against these attacks. They supposed an open problem on how to construct PEKS schemes secure against keyword guessing attacks. In this letter, we answer this question affirmatively.
Rhee, Hyun Sook   +2 more
openaire   +5 more sources

Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing

open access: yesIEEE Access, 2020
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso   +4 more
doaj   +1 more source

Research on attribute-based encryption with keyword search for cloud storage

open access: yes网络与信息安全学报, 2017
To safeguard the sensitive data stored on the cloud and promote the efficiency of data sharing simulta-neously,a secure flexible and efficient attribute-based encryption scheme with keyword search is proposed,which designs an index generation mechanism ...
Zhi-qiang ZHU,Hang SU,Lei SUN,Zuo-hui LI
doaj   +3 more sources

Registered Keyword Searchable Encryption Based on SM9

open access: yesApplied Sciences, 2023
The SM9 algorithm is an Identity-Based Encryption (IBE) algorithm independently made by China. The existing SM9 searchable encryption scheme cannot be effective against insider keyword guessing attacks and violates users’ data privacy.
Haoyu Zhang, Baodong Qin, Dong Zheng
doaj   +1 more source

Analysis and Improvement of Searchable Encryption Scheme Based on Composite-Order Bilinear Pairs [PDF]

open access: yesJisuanji gongcheng, 2020
Searchable encryption,as the core technology of secure search,enables data storage servers to retrieve data under ciphertext.However,the existing searchable encryption scheme without secure channel fail to resist off-line keyword guessing attacks ...
DENG Zhihui, WANG Shaohui, WANG Ping
doaj   +1 more source

A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms

open access: yesIEEE Access, 2020
Recently, attribute-based keyword search (ABKS) schemes have been used to provide fine-grained search over encrypted data on eHealth cloud in the Internet of Things (IoT) platforms.
Lifeng Guo   +3 more
doaj   +1 more source

Multi-Server Verifiable Attribute-Based Multi-Keyword Sorting Retrieval Scheme [PDF]

open access: yesJisuanji gongcheng, 2020
To solve the problems of uncontrollable search behavior,untrusted search results and unitary search semantics of existing searchable encryption schemes,this paper proposes a verifiable attribute-based multi-keyword sorting retrieval scheme under multi ...
CAO Suzhen, DU Xialing, WANG Youchen, LIU Xueyan
doaj   +1 more source

Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization [PDF]

open access: yes, 2011
In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a ...
Tang, Qiang
core   +5 more sources

Home - About - Disclaimer - Privacy