Results 21 to 30 of about 19,326 (124)
Proxy Re-Encryption Scheme Supporting Keyword Search in Email System [PDF]
To authorize others to deal with encrypted mails and enable the search of encrypted mails in an encrypted email system,this paper proposes a proxy re-encryption scheme that supports keyword search for email systems.In this scheme,searchable encryption ...
NIU Shufen, CHEN Lixia, LIU Wenke, WANG Caifen, DU Xiaoni
doaj +1 more source
Registered Keyword Searchable Encryption Based on SM9
The SM9 algorithm is an Identity-Based Encryption (IBE) algorithm independently made by China. The existing SM9 searchable encryption scheme cannot be effective against insider keyword guessing attacks and violates users’ data privacy.
Haoyu Zhang, Baodong Qin, Dong Zheng
doaj +1 more source
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms
Recently, attribute-based keyword search (ABKS) schemes have been used to provide fine-grained search over encrypted data on eHealth cloud in the Internet of Things (IoT) platforms.
Lifeng Guo +3 more
doaj +1 more source
How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes.
Yiming Zhu +4 more
doaj +1 more source
Lightweight searchable medical data sharing scheme
The attribute-based encryption scheme supporting policy hiding and keyword search had a good application prospect in medical scenarios.However, most of the existing schemes did not support large attribute university or adopt the "AND gate&quot ...
Xinchun YIN, Mengyu WANG, Jianting NING
doaj +2 more sources
Public key searchable encryption scheme based on blockchain
Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.
Ruizhong DU, Ailun TAN, Junfeng TIAN
doaj +2 more sources
With the rapid development of informatization, an increasing number of industries and organizations outsource their data to cloud servers, to avoid the cost of local data management and to share data.
Bin Wu, Caifen Wang, Hailong Yao
doaj +1 more source
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify data management. Public key encryption with keyword search (PEKS) is an important cryptographic primitive as it provides the ability to search for the ...
Jingwei Lu +5 more
doaj +1 more source
The Industrial Internet of Things (IIoT) collects a large amount of data through various types of sensors and intelligently processes this data using cloud computing, which is flexible, efficient, and cost-effective.
Xiaoguang Liu +3 more
doaj +1 more source
To solve the problems of single-user search, single-keyword search, high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment, a certificateless ciphertext retrieval scheme with multi ...
Xiaodong YANG +4 more
doaj +2 more sources

