Results 81 to 90 of about 19,326 (124)
Some of the next articles are maybe not open access.
Proxy re-encryption conjunctive keyword search against keyword guessing attack
2013 Computing, Communications and IT Applications Conference (ComComAp), 2013Public key encryption with keyword search enables users to retrieve keywords from encrypted data, which can protect data confidentiality without losing the search operability. However, it is also vulnerable to keyword guessing attacks. In this paper, we propose a conjunctive keywords searchable encryption with designated tester (dPECK) to prevent the ...
null Yang Yang +2 more
openaire +2 more sources
International Journal of Communication Systems, 2018
SummaryDesignated server public key encryption with keyword search (dPEKS) removes the secure channel requirement in public key encryption with keyword search (PEKS). With the dPEKS mechanism, a user is able to delegate the search tasks on the ciphertexts sent to him/her to a designated storage server without leaking the corresponding plaintexts ...
Yang Lu, Jiguo Li
openaire +2 more sources
SummaryDesignated server public key encryption with keyword search (dPEKS) removes the secure channel requirement in public key encryption with keyword search (PEKS). With the dPEKS mechanism, a user is able to delegate the search tasks on the ciphertexts sent to him/her to a designated storage server without leaking the corresponding plaintexts ...
Yang Lu, Jiguo Li
openaire +2 more sources
IEEE Transactions on Cloud Computing
As a variant of PEKS (Public key Encryption with Keyword Search), Zhang et al. (IEEE Transactions on Cloud Computing 2021) introduced a secure and efficient PEKS scheme called SEPSE, where servers issue a servers-derived keyword to a sender or a receiver.
K. Emura
openaire +2 more sources
As a variant of PEKS (Public key Encryption with Keyword Search), Zhang et al. (IEEE Transactions on Cloud Computing 2021) introduced a secure and efficient PEKS scheme called SEPSE, where servers issue a servers-derived keyword to a sender or a receiver.
K. Emura
openaire +2 more sources
Journal of Ambient Intelligence and Humanized Computing, 2019
In public-key setting, the problem of searching for keywords in encrypted data is handled by the notion of public-key encryption with keyword search (PEKS). An important challenge in designing secure PEKS schemes is providing resistance against variants of an attack known as the keyword guessing attack (KGA).
Mahnaz Noroozi, Ziba Eslami
openaire +2 more sources
In public-key setting, the problem of searching for keywords in encrypted data is handled by the notion of public-key encryption with keyword search (PEKS). An important challenge in designing secure PEKS schemes is providing resistance against variants of an attack known as the keyword guessing attack (KGA).
Mahnaz Noroozi, Ziba Eslami
openaire +2 more sources
Efficient Revocable Attribute-Based Keyword Search Against Keyword Guessing Attack
2024 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)Attribute-Based Keyword Search (ABKS) technology has changed the way data is encrypted and retrieved, enabling data owners to securely store encrypted data in the cloud and allow retrieval only by users who comply with specific access policies.
Chen Zhu +4 more
openaire +2 more sources
Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing Attacks
2017 Fifth International Symposium on Computing and Networking (CANDAR), 2017To achieve keyword search in secure cloud storage, a public-key encryption with keyword search (PEKS) has been proposed. However, the PEKS is inherently vulnerable to the Keyword Guessing Attack (KGA): Using the public key, anyone including the server can compute the ciphertext of any keyword.
Takanori Saito, Toru Nakanishi
openaire +2 more sources
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data
Secure Data Management, 2006A keyword search scheme over encrypted documents allows for remote keyword search of documents by a user in possession of a trapdoor (secret key). A data supplier first uploads encrypted documents on a storage system, and then a user of the storage system searches documents containing keywords while insider (such as administrators of the storage system)
Jin Wook Byun +3 more
openaire +2 more sources
Constructing PEKS schemes secure against keyword guessing attacks is possible?
Computer Communications, 2009Byun et al. suggested keyword guessing attacks and showed that some PEKS (public-key encryption with keyword search) schemes are not secure to keyword guessing attacks, when the number of possible keywords is bounded by some polynomial. Abdalla et al. showed that robust PEKS schemes should satisfy consistency which ensures the PEKS schemes fulfil their
Ik Rae Jeong +3 more
openaire +2 more sources
Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks
International Conference on Machine Learning for Cyber Security, 2020Machine learning is more closely linked to data privacy and has obtained rapid development in recent years. As for data privacy, searchable encryption (SE) is widely used as a ciphertext search technology, protecting the privacy of users. However, existing schemes usually support single keyword search, so the remote cloud server (CS) may return some ...
Zhenwei Chen +5 more
openaire +2 more sources
Information Sciences, 2019
Abstract Public key encryption with keyword search (PEKS) is a useful paradigm that enables a user to delegate searching capabilities on publicly encrypted data to an untrusted third party without revealing the data contents. In 2013, Fang et al.
Yang Lu, Gang Wang, Jiguo Li
openaire +2 more sources
Abstract Public key encryption with keyword search (PEKS) is a useful paradigm that enables a user to delegate searching capabilities on publicly encrypted data to an untrusted third party without revealing the data contents. In 2013, Fang et al.
Yang Lu, Gang Wang, Jiguo Li
openaire +2 more sources

