Results 21 to 30 of about 10,393 (185)
Designated server-aided revocable identity-based keyword search on lattice
Public key encryption scheme with keyword search is a promising technique supporting search on encrypted data without leaking any information about the keyword. In real applications, it’s critical to find an effective revocation method to revoke users in
Ying Guo +4 more
doaj +1 more source
A practical and secure multi-keyword search method over encrypted cloud data [PDF]
Cloud computing technologies become more and more popular every year, as many organizations tend to outsource their data utilizing robust and fast services of clouds while lowering the cost of hardware ownership.
Kantarcioglu, Murat +5 more
core +1 more source
The Industrial Internet of Things (IIoT) collects a large amount of data through various types of sensors and intelligently processes this data using cloud computing, which is flexible, efficient, and cost-effective.
Xiaoguang Liu +3 more
doaj +1 more source
Public-Key Encryption with Integrated Keyword Search
Since the last decade, the public-key encryption with keyword search (PEKS) has been studied as a popular technique for searching data over encrypted files. The notion finds useful application for fine-grained data search on outsourced encrypted data like iCloud, mobile cloud data, etc.
Vishal Saraswat +4 more
openaire +2 more sources
Efficient and secure ranked multi-keyword search on encrypted cloud data [PDF]
Information search and document retrieval from a remote database (e.g. cloud server) requires submitting the search terms to the database holder. However, the search terms may contain sensitive information that must be kept secret from the database ...
Orencik, Cengiz +3 more
core +1 more source
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings
Internet of Things (IoT) and cloud computing are adopted widely in daily life and industrial production. Sensors of IoT equipment gather personal, sensitive and important data, which is stored in a cloud server.
Shuo Zhang +4 more
doaj +1 more source
Distributed Searchable Asymmetric Encryption [PDF]
Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange
Liu, Jie, Teng, Lin, Yin, Shoulin
core +2 more sources
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso +4 more
doaj +1 more source
SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search
Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either what is searched for or the contents of the searched data ciphertexts.
Yang Lu, Jiguo Li, Yichen Zhang
doaj +1 more source
Shared and Searchable Encrypted Data for Untrusted Servers [PDF]
Current security mechanisms pose a risk for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu +2 more
core +3 more sources

