Results 101 to 110 of about 19,326 (124)
Some of the next articles are maybe not open access.

Online/offline attribute-based encryption with keyword search against Keyword Guessing Attack

2017 3rd IEEE International Conference on Computer and Communications (ICCC), 2017
With the exposure of security events in cloud storage, encrypting data before uploading has become the most favorable choice for cloud users, which makes search on encrypted data an important issue. Attribute-based encryption with keyword search (ABKS), which achieves data access control and search on encrypted data at the same time, has risen in ...
Hang Su, Zhiqiang Zhu, Lei Sun
openaire   +1 more source

Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server

Journal of Shanghai Jiaotong University (Science), 2014
The user data stored in an untrusted server, such as the centralized data center or cloud computing server, may be dangerous of eavesdropping if the data format is a plaintext. However, the general ciphertext is difficult to search and thus limited for practical usage.
Chih-hung Wang, Tai-yuan Tu
openaire   +1 more source

An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks

Journal of Systems Architecture, 2021
Abstract As the wave of data breaches continues crashing down on companies, specially for companies that provide cloud storage services, the data security and privacy have become the main concern of most clients that use this kind of services. Certificateless public key encryption with keyword search (CLPEKS) is a novel cryptographic primitives that ...
Mohammed Raouf Senouci   +3 more
openaire   +1 more source

Conjunctive Keywords Searchable Encryption Scheme Against Inside Keywords Guessing Attack from Lattice

2020
Public-key encryption with conjunctive keywords search (PECKS) is an extension of public-key encryption with keywords search (PEKS), which can realize the efficient search of the encrypted data stored in the cloud server and keep the privacy of these data during the search phase.
Xiaoling Yu, Chungen Xu, Bennian Dou
openaire   +1 more source

Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack

IEEE Transactions on Computers, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Peng   +3 more
openaire   +2 more sources

Server-Assisted Certificateless Searchable Encryption Scheme for Industrial Internet of Things Against Keyword Guessing Attacks

International Conference on Advanced Cloud and Big Data
The Industrial Internet of Things (IIoT) represents a promising application of the Internet of Things (IoT) in industry, offering significant potential for enhancing manufacturing efficiency and enabling smart production. In the context of the IIoT, data
Hong Zhong   +5 more
semanticscholar   +1 more source

Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices

Transactions on Emerging Telecommunications Technologies, 2018
AbstractPublic key encryption With keyword search (PEKS) enables a cloud server (CS) to get the search trapdoor to identify ciphertext containing the target keyword without decrypting the ciphertext or knowing the target keyword. With the advent of mobile cloud computing, PEKS has ushered in an era of new development opportunities and new challenges ...
Yaojun Mao   +3 more
openaire   +1 more source

Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack

Science China Information Sciences, 2016
Attribute-based encryption with keyword search (ABKS) enables data owners to grant their search capabilities to other users by enforcing an access control policy over the outsourced encrypted data. However, existing ABKS schemes cannot guarantee the privacy of the access structures, which may contain some sensitive private information.
Shuo Qiu   +3 more
openaire   +1 more source

An Access Control Model Against Attribute Guessing Attacks for Data Sharing in Cloud Computing Environment

Concurrency and Computation
Data sharing is a fundamental component that facilitates collaboration and interoperability among entities in cloud computing environments. It enables cross‐domain access, concurrent task execution, and parallel multi‐task processing. However, challenges
Qikun Zhang   +5 more
semanticscholar   +1 more source

Verifiable Conjunctive Field Keyword Searchable Encryption With Aggregate Keys for E-Health Cloud

IEEE Internet of Things Journal
With the rapid proliferation of Internet of Things (IoT)-enabled healthcare systems, sensitive data, such as electronic health records (EHRs) are increasingly outsourced to semi-trusted e-health clouds, raising critical concerns about privacy and ...
Xihui Lu   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy