Results 161 to 170 of about 3,148 (188)
Some of the next articles are maybe not open access.

Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes

2021
Public key encryption with keyword search (PEKS) is a practical cryptographic paradigm that enables one to search for the encrypted data without compromising the security of the original data. It provides a promising solution to the encrypted data retrieval issue in public key cryptosystems. As a combination of PEKS and proxy re-encryption (PRE), proxy
Xuanang Yu   +3 more
openaire   +1 more source

Online/offline attribute-based encryption with keyword search against Keyword Guessing Attack

2017 3rd IEEE International Conference on Computer and Communications (ICCC), 2017
With the exposure of security events in cloud storage, encrypting data before uploading has become the most favorable choice for cloud users, which makes search on encrypted data an important issue. Attribute-based encryption with keyword search (ABKS), which achieves data access control and search on encrypted data at the same time, has risen in ...
Hang Su, Zhiqiang Zhu, Lei Sun
openaire   +1 more source

Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server

Journal of Shanghai Jiaotong University (Science), 2014
The user data stored in an untrusted server, such as the centralized data center or cloud computing server, may be dangerous of eavesdropping if the data format is a plaintext. However, the general ciphertext is difficult to search and thus limited for practical usage.
Chih-hung Wang, Tai-yuan Tu
openaire   +1 more source

Conjunctive Keywords Searchable Encryption Scheme Against Inside Keywords Guessing Attack from Lattice

2020
Public-key encryption with conjunctive keywords search (PECKS) is an extension of public-key encryption with keywords search (PEKS), which can realize the efficient search of the encrypted data stored in the cloud server and keep the privacy of these data during the search phase.
Xiaoling Yu, Chungen Xu, Bennian Dou
openaire   +1 more source

Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack

IEEE Transactions on Computers, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Peng   +3 more
openaire   +2 more sources

Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices

Transactions on Emerging Telecommunications Technologies, 2018
AbstractPublic key encryption With keyword search (PEKS) enables a cloud server (CS) to get the search trapdoor to identify ciphertext containing the target keyword without decrypting the ciphertext or knowing the target keyword. With the advent of mobile cloud computing, PEKS has ushered in an era of new development opportunities and new challenges ...
Yaojun Mao   +3 more
openaire   +1 more source

A Survey on Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage

Advances in Computational Intelligence in Materials Science, 2023
A key component of data security in cloud computing systems is encryption. Encryption might not be enough, though, to shield sensitive data from hostile intrusions. One such attack is the keyword guessing attack, in which an attacker uses a variety of techniques to attempt to decipher a term from the encrypted data.
Subha R   +5 more
openaire   +1 more source

Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage

Journal of Systems Architecture
Axin Wu   +4 more
openaire   +3 more sources

Public key authenticated encryption with field-free subset conjunctive and disjunctive keyword search against keyword guessing attacks

Peer-to-Peer Networking and Applications
Venkata Bhikshapathi Chenam   +2 more
openaire   +3 more sources

Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack

Science China Information Sciences, 2016
Attribute-based encryption with keyword search (ABKS) enables data owners to grant their search capabilities to other users by enforcing an access control policy over the outsourced encrypted data. However, existing ABKS schemes cannot guarantee the privacy of the access structures, which may contain some sensitive private information.
Shuo Qiu   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy