Results 21 to 30 of about 197 (148)
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify data management. Public key encryption with keyword search (PEKS) is an important cryptographic primitive as it provides the ability to search for the ...
Jingwei Lu +5 more
doaj +1 more source
The Industrial Internet of Things (IIoT) collects a large amount of data through various types of sensors and intelligently processes this data using cloud computing, which is flexible, efficient, and cost-effective.
Xiaoguang Liu +3 more
doaj +1 more source
SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search
Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries ...
Hyundo Yoon +5 more
doaj +1 more source
Public key encryption with keyword search (PEKS) allows a cloud server to retrieve particular ciphertexts without leaking the contents of the searched ciphertexts.
Chen Shen, Yang Lu, Jiguo Li
doaj +1 more source
A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment
Currently, the security situation of data security and user privacy protection is increasingly serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy disclosure.
Lihua Liu +3 more
doaj +1 more source
Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search
In the current era of information explosion, users’ demand for data storage is increasing, and data on the cloud has become the first choice of users and enterprises.
Le Li +3 more
doaj +1 more source
Estimating 6D Aircraft Pose from Keypoints and Structures
This article addresses the challenge of 6D aircraft pose estimation from a single RGB image during the flight. Many recent works have shown that keypoints-based approaches, which first detect keypoints and then estimate the 6D pose, achieve remarkable ...
Runze Fan, Ting-Bing Xu, Zhenzhong Wei
doaj +1 more source
Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment
While transferring data to cloud servers frees users from having to manage it, it eventually raises new problems, such as data privacy. The concept of searchable encryption has drawn more and more focus in research as a means of resolving the tension ...
Buzhen He, Tao Feng
doaj +1 more source
The public key encryption with keyword search (PEKS) scheme is a cryptographic primitive that allows a cloud server to search for a ciphertext without knowing the corresponding keyword used in the search.
Koon-Ming Chan +3 more
doaj +1 more source
Lattice-Based Searchable Encryption With Keywords Revocable and Bounded Trapdoor Exposure Resistance
Searchable encryption plays a vital role in keeping data privacy of current cloud storage. Considering the security threat of trapdoor exposure, Emura et al. introduced a formal definition of keywords revocable public-key encryption with keywords search (
Xiaoling Yu, Chungen Xu, Lei Xu
doaj +1 more source

