Results 21 to 30 of about 3,148 (188)
How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes.
Yiming Zhu +4 more
doaj +1 more source
Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment [PDF]
Public cloud service providers provide an infrastructure that gives businesses and individuals access to computing power and storage space on a pay-as-you-go basis.
Blass +7 more
core +2 more sources
Lightweight searchable medical data sharing scheme
The attribute-based encryption scheme supporting policy hiding and keyword search had a good application prospect in medical scenarios.However, most of the existing schemes did not support large attribute university or adopt the "AND gate&quot ...
Xinchun YIN, Mengyu WANG, Jianting NING
doaj +2 more sources
A practical attack on the fixed RC4 in the wep mode [PDF]
. In this paper we revisit a known but ignored weakness of the RC4 keystream generator, where secret state info leaks to the generated keystream, and show that this leakage, also known as Jenkins’ correlation or the RC4 glimpse, can be used to attack RC4
A. Maximov +14 more
core +1 more source
Public key searchable encryption scheme based on blockchain
Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.
Ruizhong DU, Ailun TAN, Junfeng TIAN
doaj +2 more sources
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify data management. Public key encryption with keyword search (PEKS) is an important cryptographic primitive as it provides the ability to search for the ...
Jingwei Lu +5 more
doaj +1 more source
SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks [PDF]
A number of searchable encryption schemes have been widely proposed to solve the search problem in ciphertext domain. However, most existing searchable encryption schemes are vulnerable to keyword guessing attacks. During keyword guessing attacks, with the help of the cloud, an adversary will learn what keyword a given trapdoor is searching for, which ...
Hongyuan Chen +3 more
openaire +2 more sources
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data [PDF]
Searchable Encryption is an emerging cryptographic technique that enables searching capabilities over the encrypted data on the cloud. In this paper, a novel searchable encryption scheme for the client-server architecture has been presented.
Glackin, C. +4 more
core +1 more source
The Industrial Internet of Things (IIoT) collects a large amount of data through various types of sensors and intelligently processes this data using cloud computing, which is flexible, efficient, and cost-effective.
Xiaoguang Liu +3 more
doaj +1 more source
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF]
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can securely outsource a database to an untrusted server, in such a way that the database can still be searched and updated efficiently.
Bost, Raphael +2 more
core +2 more sources

