Results 21 to 30 of about 22,366 (192)

An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
In the cloud, users prefer to store their sensitive data in encrypted form. Searching keywords over encrypted data without loss of data confidentiality is an important issue. In 2004, Boneh et al.
Junling Guo   +4 more
doaj   +1 more source

Novel Multi-user Conjunctive Keyword Search Against Keyword Guessing Attacks Under Simple Assumptions

open access: closedKSII Transactions on Internet and Information Systems, 2017
Zhiyuan Zhao, Jianhua Wang
openalex   +2 more sources

An Efficient Public Key Searchable Encryption Scheme for Mobile Smart Terminal

open access: yesIEEE Access, 2020
With the wide application of the mobile smart terminals, the data privacy protection of the mobile smart terminals stored in the cloud is more and more important.
Ningbin Yang, Shumei Xu, Zhou Quan
doaj   +1 more source

An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time

open access: yesIEEE Access, 2021
Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography.
Lidong Han   +4 more
doaj   +1 more source

Multi-Server Multi-Keyword Searchable Encryption Scheme for Designated User [PDF]

open access: yesJisuanji gongcheng, 2021
The existing searchable encryption schemes are limited in the efficiency of ciphertext retrieval and accuracy of search results,and generally do not support the verification of data user identity.To address the problems,a multi-server multi-keyword ...
DOU Fengge, CAO Suzhen, MA Jiajia, DING Xiaohui, WANG Caifen
doaj   +1 more source

Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing

open access: yesIEEE Access, 2020
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso   +4 more
doaj   +1 more source

Research on attribute-based encryption with keyword search for cloud storage

open access: yes网络与信息安全学报, 2017
To safeguard the sensitive data stored on the cloud and promote the efficiency of data sharing simulta-neously,a secure flexible and efficient attribute-based encryption scheme with keyword search is proposed,which designs an index generation mechanism ...
Zhi-qiang ZHU,Hang SU,Lei SUN,Zuo-hui LI
doaj   +3 more sources

Analysis and Improvement of Searchable Encryption Scheme Based on Composite-Order Bilinear Pairs [PDF]

open access: yesJisuanji gongcheng, 2020
Searchable encryption,as the core technology of secure search,enables data storage servers to retrieve data under ciphertext.However,the existing searchable encryption scheme without secure channel fail to resist off-line keyword guessing attacks ...
DENG Zhihui, WANG Shaohui, WANG Ping
doaj   +1 more source

Registered Keyword Searchable Encryption Based on SM9

open access: yesApplied Sciences, 2023
The SM9 algorithm is an Identity-Based Encryption (IBE) algorithm independently made by China. The existing SM9 searchable encryption scheme cannot be effective against insider keyword guessing attacks and violates users’ data privacy.
Haoyu Zhang, Baodong Qin, Dong Zheng
doaj   +1 more source

A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms

open access: yesIEEE Access, 2020
Recently, attribute-based keyword search (ABKS) schemes have been used to provide fine-grained search over encrypted data on eHealth cloud in the Internet of Things (IoT) platforms.
Lifeng Guo   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy