Results 151 to 160 of about 3,148 (188)
Some of the next articles are maybe not open access.
IEEE Transactions on Cloud Computing, 2021
Cloud storage enables users to outsource data to storage servers and retrieve target data efficiently. Some of the outsourced data are very sensitive and should be prevented for any leakage. Generally, if users conventionally encrypt the data, searching is impeded. Public-key encryption with keyword search (PEKS) resolves this tension.
Yuan Zhang +4 more
openaire +3 more sources
Cloud storage enables users to outsource data to storage servers and retrieve target data efficiently. Some of the outsourced data are very sensitive and should be prevented for any leakage. Generally, if users conventionally encrypt the data, searching is impeded. Public-key encryption with keyword search (PEKS) resolves this tension.
Yuan Zhang +4 more
openaire +3 more sources
Journal of Systems Architecture, 2021
Abstract As the wave of data breaches continues crashing down on companies, specially for companies that provide cloud storage services, the data security and privacy have become the main concern of most clients that use this kind of services. Certificateless public key encryption with keyword search (CLPEKS) is a novel cryptographic primitives that ...
Mohammed Raouf Senouci +3 more
openaire +3 more sources
Abstract As the wave of data breaches continues crashing down on companies, specially for companies that provide cloud storage services, the data security and privacy have become the main concern of most clients that use this kind of services. Certificateless public key encryption with keyword search (CLPEKS) is a novel cryptographic primitives that ...
Mohammed Raouf Senouci +3 more
openaire +3 more sources
Constructing PEKS schemes secure against keyword guessing attacks is possible?
Computer Communications, 2009Byun et al. suggested keyword guessing attacks and showed that some PEKS (public-key encryption with keyword search) schemes are not secure to keyword guessing attacks, when the number of possible keywords is bounded by some polynomial. Abdalla et al. showed that robust PEKS schemes should satisfy consistency which ensures the PEKS schemes fulfil their
Ik Rae Jeong +3 more
openaire +3 more sources
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
Information Sciences, 2017zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Huang, Qiong, Li, Hongbo
openaire +3 more sources
Information Sciences, 2019
Abstract Public key encryption with keyword search (PEKS) is a useful paradigm that enables a user to delegate searching capabilities on publicly encrypted data to an untrusted third party without revealing the data contents. In 2013, Fang et al.
Yang Lu, Gang Wang, Jiguo Li
openaire +3 more sources
Abstract Public key encryption with keyword search (PEKS) is a useful paradigm that enables a user to delegate searching capabilities on publicly encrypted data to an untrusted third party without revealing the data contents. In 2013, Fang et al.
Yang Lu, Gang Wang, Jiguo Li
openaire +3 more sources
Journal of Ambient Intelligence and Humanized Computing, 2019
In public-key setting, the problem of searching for keywords in encrypted data is handled by the notion of public-key encryption with keyword search (PEKS). An important challenge in designing secure PEKS schemes is providing resistance against variants of an attack known as the keyword guessing attack (KGA).
Mahnaz Noroozi, Ziba Eslami
openaire +3 more sources
In public-key setting, the problem of searching for keywords in encrypted data is handled by the notion of public-key encryption with keyword search (PEKS). An important challenge in designing secure PEKS schemes is providing resistance against variants of an attack known as the keyword guessing attack (KGA).
Mahnaz Noroozi, Ziba Eslami
openaire +3 more sources
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
International Journal of Computer Mathematics, 2013The first searchable public key encryption scheme with designated testers dPEKS known to be secure against keyword guessing attacks was due to Rhee et al. [H.S. Rhee, W. Susilo, and H.J. Kim, Secure searchable public key encryption scheme against keyword guessing attacks, IEICE Electron. Express 65 2009, pp. 237–243].
Yau, Wei-Chuen +3 more
openaire +4 more sources
Proxy re-encryption conjunctive keyword search against keyword guessing attack
2013 Computing, Communications and IT Applications Conference (ComComAp), 2013Public key encryption with keyword search enables users to retrieve keywords from encrypted data, which can protect data confidentiality without losing the search operability. However, it is also vulnerable to keyword guessing attacks. In this paper, we propose a conjunctive keywords searchable encryption with designated tester (dPECK) to prevent the ...
null Yang Yang +2 more
openaire +1 more source
A secure attribute based keyword search scheme against keyword guessing attack
2016 8th International Symposium on Telecommunications (IST), 2016To provide the privacy of the users who receive some computing services from the cloud, the users must encrypt their documents before outsourcing them to the cloud. Computation on outsourced encrypted data in the cloud rises some complexity to the system specially in the case when an entity would like to find some documents related to a special keyword.
Vahid Yousefipoor +3 more
openaire +1 more source

