Results 11 to 20 of about 197 (148)

Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing

open access: yesIEEE Access, 2020
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso   +4 more
doaj   +1 more source

Design of College English Online Teaching Platform Based on Dual-Server PEKS Framework

open access: yesAdvances in Multimedia, 2022
To improve the English learning efficiency of college students and improve the performance of network teaching, the research on the college English network teaching platform is carried out under the dual-server PEKS framework.
Hua Wang
doaj   +1 more source

How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?

open access: yesFuture Internet, 2023
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes.
Yiming Zhu   +4 more
doaj   +1 more source

An Efficient Public Key Searchable Encryption Scheme for Mobile Smart Terminal

open access: yesIEEE Access, 2020
With the wide application of the mobile smart terminals, the data privacy protection of the mobile smart terminals stored in the cloud is more and more important.
Ningbin Yang, Shumei Xu, Zhou Quan
doaj   +1 more source

Verifiable Cloud Data Sharing Scheme that Supports Privacy Protection [PDF]

open access: yesJisuanji gongcheng, 2023
With the rapid development of mobile Internet technology, an increasing amount of data is stored on remote cloud servers, thereby increasing the search and sharing of sensitive data in outsourced cloud storage.To cope with these issues, a public-key ...
ZHANG Xiaojun, LIU Qing, ZHENG Shuang, WANG Xin, XUE Jingting, WANG Shixiong
doaj   +1 more source

Public-Key Encryption With Keyword Search via Obfuscation

open access: yesIEEE Access, 2019
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation.
Chengyu Hu   +3 more
doaj   +1 more source

Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud

open access: yesCryptography, 2020
In the area of searchable encryption, public key encryption with keyword search (PEKS) has been a critically important and promising technique which provides secure search over encrypted data in cloud computing. PEKS can protect user data privacy without
Yunhong Zhou, Shihui Zheng, Licheng Wang
doaj   +1 more source

SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search

open access: yesIEEE Access, 2019
Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either what is searched for or the contents of the searched data ciphertexts.
Yang Lu, Jiguo Li, Yichen Zhang
doaj   +1 more source

VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme

open access: yesApplied Sciences, 2023
Public key encryption with keyword search (PEKS) allows users to perform keyword searches of ciphertext on untrusted cloud storage servers, protecting data privacy while sharing data. However, it faces several security problems in practical applications.
Yingying Tang   +4 more
doaj   +1 more source

Multi-Recipient encryption with keyword search without pairing for cloud storage

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
With the rapid development of cloud computing technology and communication technology, cloud storage has become a tool used by people in daily life. Cloud storage service enables users to outsource data to cloud servers and retrieve desired document ...
Ningbin Yang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy