Results 71 to 80 of about 19,326 (124)
Lattice-Based Searchable Encryption Scheme Against Inside Keywords Guessing Attack
Xiaoling Yu +3 more
openaire +1 more source
A secure data sharing model against keyword guessing attacks in edge-cloud collaboration scenarios
Abstract In the context of edge cloud collaboration scenarios, data sharing is an essential technological tool, and smart devices face significant challenges when it comes to data sharing security. In scenarios involving edge clouds, attribute-based keyword search (ABKS) is utilized to enable fine-grained access control over shared data and ...
Qikun Zhang +4 more
openaire +1 more source
Multi-keyword public key searchable encryption scheme with pattern hiding
To address the limitations of existing multi-user searchable encryption (SE) schemes that fail to hide access patterns, search patterns, and resist keyword guessing attacks, a novel public-key searchable encryption scheme was proposed supporting multi ...
NIE Xuyun +6 more
doaj
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack
Vahid Yousefipoor +3 more
openaire +1 more source
Yang Ma, Hassan Kazemian
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes
International Conference on Adaptive and Intelligent Systems, 2021Public key encryption with keyword search (PEKS) is a practical cryptographic paradigm that enables one to search for the encrypted data without compromising the security of the original data. It provides a promising solution to the encrypted data retrieval issue in public key cryptosystems. As a combination of PEKS and proxy re-encryption (PRE), proxy
Xuanang Yu +3 more
openaire +2 more sources
IEEE Transactions on Cloud Computing, 2021
Cloud storage enables users to outsource data to storage servers and retrieve target data efficiently. Some of the outsourced data are very sensitive and should be prevented for any leakage. Generally, if users conventionally encrypt the data, searching is impeded. Public-key encryption with keyword search (PEKS) resolves this tension.
Yuan Zhang +4 more
openaire +2 more sources
Cloud storage enables users to outsource data to storage servers and retrieve target data efficiently. Some of the outsourced data are very sensitive and should be prevented for any leakage. Generally, if users conventionally encrypt the data, searching is impeded. Public-key encryption with keyword search (PEKS) resolves this tension.
Yuan Zhang +4 more
openaire +2 more sources
China Communications, 2019
Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the contents of the data.
Yang Lu, Jiguo Li
openaire +2 more sources
Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the contents of the data.
Yang Lu, Jiguo Li
openaire +2 more sources
Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks
IEEE Systems Journal, 2023Driven by cloud computing technologies, public-key encryption with keyword search (PEKS) is becoming a common practice from aspects of the Industrial Internet of Things, smart healthcare, vehicular social networks, and so on.
Qing Fan +4 more
openaire +2 more sources
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
Information Sciences, 2017zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Huang, Qiong, Li, Hongbo
openaire +2 more sources

