Results 81 to 90 of about 19,326 (124)
Some of the next articles are maybe not open access.

Proxy re-encryption conjunctive keyword search against keyword guessing attack

2013 Computing, Communications and IT Applications Conference (ComComAp), 2013
Public key encryption with keyword search enables users to retrieve keywords from encrypted data, which can protect data confidentiality without losing the search operability. However, it is also vulnerable to keyword guessing attacks. In this paper, we propose a conjunctive keywords searchable encryption with designated tester (dPECK) to prevent the ...
null Yang Yang   +2 more
openaire   +2 more sources

Constructing designated server public key encryption with keyword search schemes withstanding keyword guessing attacks

International Journal of Communication Systems, 2018
SummaryDesignated server public key encryption with keyword search (dPEKS) removes the secure channel requirement in public key encryption with keyword search (PEKS). With the dPEKS mechanism, a user is able to delegate the search tasks on the ciphertexts sent to him/her to a designated storage server without leaking the corresponding plaintexts ...
Yang Lu, Jiguo Li
openaire   +2 more sources

Comments on “Blockchain-Assisted Public-Key Encryption With Keyword Search Against Keyword Guessing Attacks for Cloud Storage”

IEEE Transactions on Cloud Computing
As a variant of PEKS (Public key Encryption with Keyword Search), Zhang et al. (IEEE Transactions on Cloud Computing 2021) introduced a secure and efficient PEKS scheme called SEPSE, where servers issue a servers-derived keyword to a sender or a receiver.
K. Emura
openaire   +2 more sources

Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks

Journal of Ambient Intelligence and Humanized Computing, 2019
In public-key setting, the problem of searching for keywords in encrypted data is handled by the notion of  public-key encryption with keyword search (PEKS). An important challenge in designing secure PEKS schemes is providing resistance against variants of  an  attack  known as the keyword  guessing  attack (KGA).
Mahnaz Noroozi, Ziba Eslami
openaire   +2 more sources

Efficient Revocable Attribute-Based Keyword Search Against Keyword Guessing Attack

2024 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
Attribute-Based Keyword Search (ABKS) technology has changed the way data is encrypted and retrieved, enabling data owners to securely store encrypted data in the cloud and allow retrieval only by users who comply with specific access policies.
Chen Zhu   +4 more
openaire   +2 more sources

Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing Attacks

2017 Fifth International Symposium on Computing and Networking (CANDAR), 2017
To achieve keyword search in secure cloud storage, a public-key encryption with keyword search (PEKS) has been proposed. However, the PEKS is inherently vulnerable to the Keyword Guessing Attack (KGA): Using the public key, anyone including the server can compute the ciphertext of any keyword.
Takanori Saito, Toru Nakanishi
openaire   +2 more sources

Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data

Secure Data Management, 2006
A keyword search scheme over encrypted documents allows for remote keyword search of documents by a user in possession of a trapdoor (secret key). A data supplier first uploads encrypted documents on a storage system, and then a user of the storage system searches documents containing keywords while insider (such as administrators of the storage system)
Jin Wook Byun   +3 more
openaire   +2 more sources

Constructing PEKS schemes secure against keyword guessing attacks is possible?

Computer Communications, 2009
Byun et al. suggested keyword guessing attacks and showed that some PEKS (public-key encryption with keyword search) schemes are not secure to keyword guessing attacks, when the number of possible keywords is bounded by some polynomial. Abdalla et al. showed that robust PEKS schemes should satisfy consistency which ensures the PEKS schemes fulfil their
Ik Rae Jeong   +3 more
openaire   +2 more sources

Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks

International Conference on Machine Learning for Cyber Security, 2020
Machine learning is more closely linked to data privacy and has obtained rapid development in recent years. As for data privacy, searchable encryption (SE) is widely used as a ciphertext search technology, protecting the privacy of users. However, existing schemes usually support single keyword search, so the remote cloud server (CS) may return some ...
Zhenwei Chen   +5 more
openaire   +2 more sources

Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement

Information Sciences, 2019
Abstract Public key encryption with keyword search (PEKS) is a useful paradigm that enables a user to delegate searching capabilities on publicly encrypted data to an untrusted third party without revealing the data contents. In 2013, Fang et al.
Yang Lu, Gang Wang, Jiguo Li
openaire   +2 more sources

Home - About - Disclaimer - Privacy