Results 11 to 20 of about 10,393 (185)

SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search

open access: yesApplied Sciences, 2020
Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries ...
Hyundo Yoon   +5 more
doaj   +1 more source

A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods

open access: yesInternational Journal of Mathematics and Mathematical Sciences, 2022
Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle to outsourcing sensitive data.
M.H. Noorallahzade   +2 more
doaj   +1 more source

Tree-Based Public Key Encryption with Conjunctive Keyword Search [PDF]

open access: yesSecurity and Communication Networks, 2021
Searchable public key encryption supporting conjunctive keyword search is an important technique in today’s cloud environment. Nowadays, previous schemes usually take advantage of forward index structure, which leads to a linear search complexity. In order to obtain better search efficiency, in this paper, we utilize a tree index structure instead of ...
Yu Zhang, Lei You, Yin Li
openaire   +1 more source

Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud

open access: yesCryptography, 2020
In the area of searchable encryption, public key encryption with keyword search (PEKS) has been a critically important and promising technique which provides secure search over encrypted data in cloud computing. PEKS can protect user data privacy without
Yunhong Zhou, Shihui Zheng, Licheng Wang
doaj   +1 more source

Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search

open access: yesIEEE Access, 2023
In the current era of information explosion, users’ demand for data storage is increasing, and data on the cloud has become the first choice of users and enterprises.
Le Li   +3 more
doaj   +1 more source

Towards efficient verifiable multi-keyword search over encrypted data based on blockchain [PDF]

open access: yesPeerJ Computer Science, 2022
Searchable symmetric encryption (SSE) provides an effective way to search encrypted data stored on untrusted servers. When the server is not trusted, it is indispensable to verify the results returned by it.
Wanshan Xu   +5 more
doaj   +2 more sources

Public Key Encryption with Keyword Search [PDF]

open access: yes, 2004
We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway
DAN BONEH   +3 more
openaire   +2 more sources

Smart Contract-Assisted Dynamically Searchable Encryption Scheme with Forward and Backward Security [PDF]

open access: yesJisuanji gongcheng, 2022
The dynamic searchable encryption process is vulnerable to file injection attacks and information abuseattacks caused by information leakage.Furthermore, the existing dynamic searchable encryption schemes based on public key cryptosystem often involve a ...
DING Xiaohui, CAO Suzhen, WANG Caifen
doaj   +1 more source

Combining Public Key Encryption with Keyword Search and Public Key Encryption

open access: yesIEICE Transactions on Information and Systems, 2009
In this paper, we study the problem of secure integrating public key encryption with keyword search (PEKS) with public key data encryption (PKE). We argue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random oracle model.
Rui ZHANG, Hideki IMAI
openaire   +2 more sources

Public-Key Encryption with Delegated Search [PDF]

open access: yes, 2011
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy