Results 21 to 30 of about 10,571 (279)

Designated server-aided revocable identity-based keyword search on lattice

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
Public key encryption scheme with keyword search is a promising technique supporting search on encrypted data without leaking any information about the keyword. In real applications, it’s critical to find an effective revocation method to revoke users in
Ying Guo   +4 more
doaj   +1 more source

A Pairing-Free Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things

open access: yesIEEE Access, 2023
The Industrial Internet of Things (IIoT) collects a large amount of data through various types of sensors and intelligently processes this data using cloud computing, which is flexible, efficient, and cost-effective.
Xiaoguang Liu   +3 more
doaj   +1 more source

Public-Key Encryption with Delegated Search [PDF]

open access: yes, 2011
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter   +3 more
core   +3 more sources

Public-Key Encryption with Integrated Keyword Search

open access: yesJournal of Hardware and Systems Security, 2019
Since the last decade, the public-key encryption with keyword search (PEKS) has been studied as a popular technique for searching data over encrypted files. The notion finds useful application for fine-grained data search on outsourced encrypted data like iCloud, mobile cloud data, etc.
Vishal Saraswat   +4 more
openaire   +2 more sources

A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings

open access: yesSensors, 2020
Internet of Things (IoT) and cloud computing are adopted widely in daily life and industrial production. Sensors of IoT equipment gather personal, sensitive and important data, which is stored in a cloud server.
Shuo Zhang   +4 more
doaj   +1 more source

Public Key Encryption with Keyword Search Revisited [PDF]

open access: yes, 2008
The public key encryption with keyword search (PEKS) scheme, proposed by Boneh, Di Crescenzo, Ostrovsky and Persiano, enables one to search for encrypted keywords without compromising the security of the original data. In this paper, we address two important issues of a PEKS scheme, "removing secure channel" and "refreshing keywords", which have not ...
Joonsang Baek   +2 more
openaire   +1 more source

Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing

open access: yesIEEE Access, 2020
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso   +4 more
doaj   +1 more source

Efficient and secure ranked multi-keyword search on encrypted cloud data [PDF]

open access: yes, 2012
Information search and document retrieval from a remote database (e.g. cloud server) requires submitting the search terms to the database holder. However, the search terms may contain sensitive information that must be kept secret from the database ...
Orencik, Cengiz   +3 more
core   +1 more source

SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search

open access: yesIEEE Access, 2019
Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either what is searched for or the contents of the searched data ciphertexts.
Yang Lu, Jiguo Li, Yichen Zhang
doaj   +1 more source

A practical and secure multi-keyword search method over encrypted cloud data [PDF]

open access: yes, 2013
Cloud computing technologies become more and more popular every year, as many organizations tend to outsource their data utilizing robust and fast services of clouds while lowering the cost of hardware ownership.
Kantarcioglu, Murat   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy