Results 171 to 180 of about 3,148 (188)
Some of the next articles are maybe not open access.
International Journal of Communication Systems, 2018
SummaryDesignated server public key encryption with keyword search (dPEKS) removes the secure channel requirement in public key encryption with keyword search (PEKS). With the dPEKS mechanism, a user is able to delegate the search tasks on the ciphertexts sent to him/her to a designated storage server without leaking the corresponding plaintexts ...
Yang Lu, Jiguo Li
openaire +1 more source
SummaryDesignated server public key encryption with keyword search (dPEKS) removes the secure channel requirement in public key encryption with keyword search (PEKS). With the dPEKS mechanism, a user is able to delegate the search tasks on the ciphertexts sent to him/her to a designated storage server without leaking the corresponding plaintexts ...
Yang Lu, Jiguo Li
openaire +1 more source
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data
2006A keyword search scheme over encrypted documents allows for remote keyword search of documents by a user in possession of a trapdoor (secret key). A data supplier first uploads encrypted documents on a storage system, and then a user of the storage system searches documents containing keywords while insider (such as administrators of the storage system)
Jin Wook Byun +3 more
openaire +1 more source
Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing Attacks
2017 Fifth International Symposium on Computing and Networking (CANDAR), 2017To achieve keyword search in secure cloud storage, a public-key encryption with keyword search (PEKS) has been proposed. However, the PEKS is inherently vulnerable to the Keyword Guessing Attack (KGA): Using the public key, anyone including the server can compute the ciphertext of any keyword.
Takanori Saito, Toru Nakanishi
openaire +1 more source
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes
2008The Public Key Encryption with Keyword Search Scheme (PEKS) was first proposed by Boneh et al. in 2004. This scheme solves the problem of searching on data that is encrypted using a public key setting. Recently, Baek et al. proposed a Secure Channel Free Public Key Encryption with Keyword Search (SCF-PEKS) scheme that removes the secure channel for ...
Wei-Chuen, Yau +2 more
openaire +1 more source
Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks
2020Machine learning is more closely linked to data privacy and has obtained rapid development in recent years. As for data privacy, searchable encryption (SE) is widely used as a ciphertext search technology, protecting the privacy of users. However, existing schemes usually support single keyword search, so the remote cloud server (CS) may return some ...
Zhenwei Chen +5 more
openaire +1 more source
Cluster Computing, 2018
Due to the tremendous benefits of cloud computing, an increasing number of health care providers tend to deploy the electronic medical record (EMR) storages and application services into cloud. To protect patients’ privacy, sensitive EMRs have to be encrypted before being uploaded to cloud.
Yang Lu, Jiguo Li
openaire +1 more source
Due to the tremendous benefits of cloud computing, an increasing number of health care providers tend to deploy the electronic medical record (EMR) storages and application services into cloud. To protect patients’ privacy, sensitive EMRs have to be encrypted before being uploaded to cloud.
Yang Lu, Jiguo Li
openaire +1 more source
Efficient Revocable Attribute-Based Keyword Search Against Keyword Guessing Attack
2024 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)Chen Zhu +4 more
openaire +1 more source
Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks
IEEE Systems Journal, 2023Qing Fan +4 more
openaire +1 more source
Identity-Based Group Encryption With Keyword Search Against Keyword Guessing Attack
IEEE Transactions on Information Forensics and SecurityWei Wang +4 more
openaire +1 more source

