Results 11 to 20 of about 1,939 (202)

Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review

open access: yesIEEE Access, 2022
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting. The PEKS scheme suffers from a major drawback which is keyword guessing attack.
Koon-Ming Chan   +3 more
doaj   +1 more source

A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods

open access: yesInternational Journal of Mathematics and Mathematical Sciences, 2022
Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle to outsourcing sensitive data.
M.H. Noorallahzade   +2 more
doaj   +1 more source

Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing

open access: yesIEEE Access, 2020
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso   +4 more
doaj   +1 more source

Design of College English Online Teaching Platform Based on Dual-Server PEKS Framework

open access: yesAdvances in Multimedia, 2022
To improve the English learning efficiency of college students and improve the performance of network teaching, the research on the college English network teaching platform is carried out under the dual-server PEKS framework.
Hua Wang
doaj   +1 more source

How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?

open access: yesFuture Internet, 2023
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes.
Yiming Zhu   +4 more
doaj   +1 more source

An Efficient Public Key Searchable Encryption Scheme for Mobile Smart Terminal

open access: yesIEEE Access, 2020
With the wide application of the mobile smart terminals, the data privacy protection of the mobile smart terminals stored in the cloud is more and more important.
Ningbin Yang, Shumei Xu, Zhou Quan
doaj   +1 more source

Verifiable Cloud Data Sharing Scheme that Supports Privacy Protection [PDF]

open access: yesJisuanji gongcheng, 2023
With the rapid development of mobile Internet technology, an increasing amount of data is stored on remote cloud servers, thereby increasing the search and sharing of sensitive data in outsourced cloud storage.To cope with these issues, a public-key ...
ZHANG Xiaojun, LIU Qing, ZHENG Shuang, WANG Xin, XUE Jingting, WANG Shixiong
doaj   +1 more source

Public-Key Encryption with Delegated Search [PDF]

open access: yes, 2011
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter   +3 more
core   +3 more sources

Public-Key Encryption With Keyword Search via Obfuscation

open access: yesIEEE Access, 2019
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation.
Chengyu Hu   +3 more
doaj   +1 more source

Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud

open access: yesCryptography, 2020
In the area of searchable encryption, public key encryption with keyword search (PEKS) has been a critically important and promising technique which provides secure search over encrypted data in cloud computing. PEKS can protect user data privacy without
Yunhong Zhou, Shihui Zheng, Licheng Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy