Results 11 to 20 of about 10,571 (279)

An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time

open access: yesIEEE Access, 2021
Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography.
Lidong Han   +4 more
doaj   +1 more source

SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search

open access: yesApplied Sciences, 2020
Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries ...
Hyundo Yoon   +5 more
doaj   +1 more source

A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods

open access: yesInternational Journal of Mathematics and Mathematical Sciences, 2022
Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle to outsourcing sensitive data.
M.H. Noorallahzade   +2 more
doaj   +1 more source

Tree-Based Public Key Encryption with Conjunctive Keyword Search [PDF]

open access: yesSecurity and Communication Networks, 2021
Searchable public key encryption supporting conjunctive keyword search is an important technique in today’s cloud environment. Nowadays, previous schemes usually take advantage of forward index structure, which leads to a linear search complexity. In order to obtain better search efficiency, in this paper, we utilize a tree index structure instead of ...
Yu Zhang, Lei You, Yin Li
openaire   +1 more source

Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud

open access: yesCryptography, 2020
In the area of searchable encryption, public key encryption with keyword search (PEKS) has been a critically important and promising technique which provides secure search over encrypted data in cloud computing. PEKS can protect user data privacy without
Yunhong Zhou, Shihui Zheng, Licheng Wang
doaj   +1 more source

Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search

open access: yesIEEE Access, 2023
In the current era of information explosion, users’ demand for data storage is increasing, and data on the cloud has become the first choice of users and enterprises.
Le Li   +3 more
doaj   +1 more source

Towards efficient verifiable multi-keyword search over encrypted data based on blockchain [PDF]

open access: yesPeerJ Computer Science, 2022
Searchable symmetric encryption (SSE) provides an effective way to search encrypted data stored on untrusted servers. When the server is not trusted, it is indispensable to verify the results returned by it.
Wanshan Xu   +5 more
doaj   +2 more sources

Public Key Encryption with Keyword Search [PDF]

open access: yes, 2004
We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway
DAN BONEH   +3 more
openaire   +2 more sources

Smart Contract-Assisted Dynamically Searchable Encryption Scheme with Forward and Backward Security [PDF]

open access: yesJisuanji gongcheng, 2022
The dynamic searchable encryption process is vulnerable to file injection attacks and information abuseattacks caused by information leakage.Furthermore, the existing dynamic searchable encryption schemes based on public key cryptosystem often involve a ...
DING Xiaohui, CAO Suzhen, WANG Caifen
doaj   +1 more source

Combining Public Key Encryption with Keyword Search and Public Key Encryption

open access: yesIEICE Transactions on Information and Systems, 2009
In this paper, we study the problem of secure integrating public key encryption with keyword search (PEKS) with public key data encryption (PKE). We argue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random oracle model.
Rui ZHANG, Hideki IMAI
openaire   +2 more sources

Home - About - Disclaimer - Privacy