Results 1 to 10 of about 24,577 (282)

Towards efficient verifiable multi-keyword search over encrypted data based on blockchain [PDF]

open access: goldPeerJ Computer Science, 2022
Searchable symmetric encryption (SSE) provides an effective way to search encrypted data stored on untrusted servers. When the server is not trusted, it is indispensable to verify the results returned by it.
Wanshan Xu   +5 more
doaj   +4 more sources

Dynamic multi-keyword searchable encryption scheme

open access: yes网络与信息安全学报, 2023
Users of cloud storage often outsource their data to cloud servers to save local storage resources.However, cloud storage data is out of the user’s physical control, which may lead to malicious theft or disclosure of private data on cloud.At present ...
Chenghao YUAN, Yong LI, Shuang REN
doaj   +5 more sources

A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings [PDF]

open access: yesSensors, 2020
Internet of Things (IoT) and cloud computing are adopted widely in daily life and industrial production. Sensors of IoT equipment gather personal, sensitive and important data, which is stored in a cloud server.
Shuo Zhang   +4 more
doaj   +2 more sources

New Multi-Keyword Ciphertext Search Method for Sensor Network Cloud Platforms [PDF]

open access: yesSensors, 2018
This paper proposed a multi-keyword ciphertext search, based on an improved-quality hierarchical clustering (MCS-IQHC) method. MCS-IQHC is a novel technique, which is tailored to work with encrypted data.
Lixia Xie   +4 more
doaj   +2 more sources

Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage. [PDF]

open access: yesPLoS ONE, 2018
We propose an attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage environment, in which binary attributes and AND-gate access policy are used. Our proposal enjoys several advantages.
Shangping Wang, Lisha Yao, Yaling Zhang
doaj   +2 more sources

Secure and Dynamic Multi-Keyword Ranked Search

open access: yesInternational Journal of Operations Research and Information Systems, 2021
Nowadays, information storing in third party storage is increased. Outsourcing the data to other storage device or servers which may questioned to the secure environment. However, sensitive data like medical information should need an privacy when it is stored in cloud storage. In this paper, a secure keyword search which provide the resultant data in
M. Ambika   +4 more
openaire   +3 more sources

Multi-Server Multi-Keyword Searchable Encryption Scheme for Designated User [PDF]

open access: yesJisuanji gongcheng, 2021
The existing searchable encryption schemes are limited in the efficiency of ciphertext retrieval and accuracy of search results,and generally do not support the verification of data user identity.To address the problems,a multi-server multi-keyword ...
DOU Fengge, CAO Suzhen, MA Jiajia, DING Xiaohui, WANG Caifen
doaj   +1 more source

Multi-keyword search over encrypted data with user revocation

open access: yesTongxin xuebao, 2017
A mu1ti-keyword search over encrypted data was proposec1 with fi1e-1eve1 access authorization and data user revocation scheme through emp1oying ciphertext-po1icy attribute-based encryption(CP-ABE).The scheme supports fi1e-1eve1 access authorization in ...
Qi-ying WU   +5 more
doaj   +3 more sources

Multi-keyword partial matching algorithm based on text fragments

open access: yesTongxin xuebao, 2010
Network content detection based on Key words in security gateway often need to reassemble the TCP packets and even the whole file, which will cause a long delay.
LIAO Wei-qi, ZOU Wei
doaj   +3 more sources

Multi-Server Verifiable Attribute-Based Multi-Keyword Sorting Retrieval Scheme [PDF]

open access: yesJisuanji gongcheng, 2020
To solve the problems of uncontrollable search behavior,untrusted search results and unitary search semantics of existing searchable encryption schemes,this paper proposes a verifiable attribute-based multi-keyword sorting retrieval scheme under multi ...
CAO Suzhen, DU Xialing, WANG Youchen, LIU Xueyan
doaj   +1 more source

Home - About - Disclaimer - Privacy