Results 31 to 40 of about 10,571 (279)

Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting

open access: yesIEEE Access, 2018
Data security and privacy concerns are important issues in cloud storage. In this paper, we propose a verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting.
D. N. Wu, Q. Q. Gan, X. M. Wang
doaj   +1 more source

An Efficient Public Key Searchable Encryption Scheme for Mobile Smart Terminal

open access: yesIEEE Access, 2020
With the wide application of the mobile smart terminals, the data privacy protection of the mobile smart terminals stored in the cloud is more and more important.
Ningbin Yang, Shumei Xu, Zhou Quan
doaj   +1 more source

An Encrypted Cloud Email Searching and Filtering Scheme Based on Hidden Policy Ciphertext-Policy Attribute-Based Encryption With Keyword Search

open access: yesIEEE Access, 2022
With the rapid growth of cloud email services, email encryption is beginning to be used more and more to alleviate concerns about cloud privacy and security. However, this increase in usage invites the problem of how to search and filter encrypted emails
Jian Gao, Fucai Zhou
doaj   +1 more source

Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures [PDF]

open access: yes, 2006
Content-Based Publish/Subscribe (CBPS) is an interaction model where the interests of subscribers are stored in a content-based forwarding infrastructure to guide routing of notifications to interested parties.
Raiciu, C, Rosenblum, DS
core   +1 more source

Public key encryption with temporary and fuzzy keyword search

open access: yesMathematical Biosciences and Engineering, 2019
Public Key Encryption with Keyword Search (PEKS) is a desirable technique to provide searchable functionality over encrypted data in public key settings, which allows a user to delegate a third party server to perform the search operation on encrypted data by means of keyword search trapdoor without learning about the data.
Nyamsuren Vaanchig, Zhiguang Qin
openaire   +4 more sources

Multi-user Fuzzy Retrieval Encryption Scheme Under Cloud Environment [PDF]

open access: yesJisuanji gongcheng, 2016
Most existing public encryption schemes with keyword search are only suitable for the single user setting and do not allow users to launch a fuzzy retrieval.In order to solve this problem, an encryption scheme which can meet the demand of multiple users ...
WU Daini,WANG Xiaoming
doaj   +1 more source

Encrypted Shared Data Spaces [PDF]

open access: yes, 2008
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content.
A. Wood   +13 more
core   +2 more sources

Efficient k-Resilient Public Key Authenticated Encryption with Keyword Search

open access: yesJournal of Cybersecurity and Privacy
Traditional encryption prioritises confidentiality but complicates search operations, requiring decryption before searches can be conducted. The public key encryption with keyword search (PEKS) scheme addresses this limitation by enabling authorised ...
Koon-Ming Chan   +3 more
doaj   +1 more source

Survey on public key encryption with equality test

open access: yes网络与信息安全学报, 2018
As one of the important methods of solving the problem of computation over encrypted data under multiple public keys in cloud environment,public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under (possibly)
Yuanhao WANG   +4 more
doaj   +3 more sources

Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation [PDF]

open access: yes, 2013
With the wide deployment of public cloud computing infrastructures, using clouds to host data query services has become an appealing solution for the advantages on scalability and cost-saving.
Chen, Keke, Guo, Shumin, Xu, Huiqi
core   +1 more source

Home - About - Disclaimer - Privacy