Results 21 to 30 of about 3,148 (188)

How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?

open access: yesFuture Internet, 2023
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes.
Yiming Zhu   +4 more
doaj   +1 more source

Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment [PDF]

open access: yes, 2017
Public cloud service providers provide an infrastructure that gives businesses and individuals access to computing power and storage space on a pay-as-you-go basis.
Blass   +7 more
core   +2 more sources

Lightweight searchable medical data sharing scheme

open access: yesTongxin xuebao, 2022
The attribute-based encryption scheme supporting policy hiding and keyword search had a good application prospect in medical scenarios.However, most of the existing schemes did not support large attribute university or adopt the "AND gate&quot ...
Xinchun YIN, Mengyu WANG, Jianting NING
doaj   +2 more sources

A practical attack on the fixed RC4 in the wep mode [PDF]

open access: yes, 2005
. In this paper we revisit a known but ignored weakness of the RC4 keystream generator, where secret state info leaks to the generated keystream, and show that this leakage, also known as Jenkins’ correlation or the RC4 glimpse, can be used to attack RC4
A. Maximov   +14 more
core   +1 more source

Public key searchable encryption scheme based on blockchain

open access: yesTongxin xuebao, 2020
Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.
Ruizhong DU, Ailun TAN, Junfeng TIAN
doaj   +2 more sources

Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security

open access: yesInformation, 2023
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify data management. Public key encryption with keyword search (PEKS) is an important cryptographic primitive as it provides the ability to search for the ...
Jingwei Lu   +5 more
doaj   +1 more source

SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks [PDF]

open access: yes, 2019
A number of searchable encryption schemes have been widely proposed to solve the search problem in ciphertext domain. However, most existing searchable encryption schemes are vulnerable to keyword guessing attacks. During keyword guessing attacks, with the help of the cloud, an adversary will learn what keyword a given trapdoor is searching for, which ...
Hongyuan Chen   +3 more
openaire   +2 more sources

A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data [PDF]

open access: yes, 2017
Searchable Encryption is an emerging cryptographic technique that enables searching capabilities over the encrypted data on the cloud. In this paper, a novel searchable encryption scheme for the client-server architecture has been presented.
Glackin, C.   +4 more
core   +1 more source

A Pairing-Free Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things

open access: yesIEEE Access, 2023
The Industrial Internet of Things (IIoT) collects a large amount of data through various types of sensors and intelligently processes this data using cloud computing, which is flexible, efficient, and cost-effective.
Xiaoguang Liu   +3 more
doaj   +1 more source

Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF]

open access: yes, 2017
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can securely outsource a database to an untrusted server, in such a way that the database can still be searched and updated efficiently.
Bost, Raphael   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy