Multi-Server Verifiable Attribute-Based Multi-Keyword Sorting Retrieval Scheme [PDF]
To solve the problems of uncontrollable search behavior,untrusted search results and unitary search semantics of existing searchable encryption schemes,this paper proposes a verifiable attribute-based multi-keyword sorting retrieval scheme under multi ...
CAO Suzhen, DU Xialing, WANG Youchen, LIU Xueyan
doaj +1 more source
Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization [PDF]
In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a ...
Tang, Qiang
core +5 more sources
Public Key Encryption with Equality Test in a Cloud Environment
With the rapid development and wide application of cloud computing and 5G communication, the number of mobile users is increasing rapidly, meaning that cloud storage services are receiving more and more attention.
Ping Zhang, Jinbo Li, Zhumu Fu
doaj +1 more source
Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting [PDF]
Key-aggregate searchable encryption (KASE) schemes support selective data sharing and keyword-based ciphertext searching by using the constant-size shared key and trapdoor, making these schemes attractive for resource-constrained users to store, share ...
Liu, Jinlu +4 more
core +1 more source
Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment [PDF]
Public cloud service providers provide an infrastructure that gives businesses and individuals access to computing power and storage space on a pay-as-you-go basis.
Blass +7 more
core +2 more sources
Public key encryption with temporary and fuzzy keyword search
Public Key Encryption with Keyword Search (PEKS) is a desirable technique to provide searchable functionality over encrypted data in public key settings, which allows a user to delegate a third party server to perform the search operation on encrypted ...
Nyamsuren Vaanchig, Zhiguang Qin
doaj +1 more source
A practical attack on the fixed RC4 in the wep mode [PDF]
. In this paper we revisit a known but ignored weakness of the RC4 keystream generator, where secret state info leaks to the generated keystream, and show that this leakage, also known as Jenkins’ correlation or the RC4 glimpse, can be used to attack RC4
A. Maximov +14 more
core +1 more source
Efficient Conjunctive Keywords Search over Encrypted E-Mail Data in Public Key Setting
Searchable public key encryption supporting conjunctive keywords search (SPE-CKS) enables data users to retrieve the encrypted data of interest from an untrusted server. Based on SPE-CKS, one can realize a multi-keywords search over the encrypted e-mails.
Yu Zhang, Yin Li, Yifan Wang
doaj +1 more source
Novel Multi-Keyword Search on Encrypted Data in the Cloud
Searching on encrypted data has become a very important technique in cloud computing. Such searches enable the data owner to search on the encrypted data stored on the cloud without leaking any information.
Yunyun Wu +4 more
doaj +1 more source
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data [PDF]
Searchable Encryption is an emerging cryptographic technique that enables searching capabilities over the encrypted data on the cloud. In this paper, a novel searchable encryption scheme for the client-server architecture has been presented.
Glackin, C. +4 more
core +1 more source

