Results 31 to 40 of about 10,571 (279)
Data security and privacy concerns are important issues in cloud storage. In this paper, we propose a verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting.
D. N. Wu, Q. Q. Gan, X. M. Wang
doaj +1 more source
An Efficient Public Key Searchable Encryption Scheme for Mobile Smart Terminal
With the wide application of the mobile smart terminals, the data privacy protection of the mobile smart terminals stored in the cloud is more and more important.
Ningbin Yang, Shumei Xu, Zhou Quan
doaj +1 more source
With the rapid growth of cloud email services, email encryption is beginning to be used more and more to alleviate concerns about cloud privacy and security. However, this increase in usage invites the problem of how to search and filter encrypted emails
Jian Gao, Fucai Zhou
doaj +1 more source
Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures [PDF]
Content-Based Publish/Subscribe (CBPS) is an interaction model where the interests of subscribers are stored in a content-based forwarding infrastructure to guide routing of notifications to interested parties.
Raiciu, C, Rosenblum, DS
core +1 more source
Public key encryption with temporary and fuzzy keyword search
Public Key Encryption with Keyword Search (PEKS) is a desirable technique to provide searchable functionality over encrypted data in public key settings, which allows a user to delegate a third party server to perform the search operation on encrypted data by means of keyword search trapdoor without learning about the data.
Nyamsuren Vaanchig, Zhiguang Qin
openaire +4 more sources
Multi-user Fuzzy Retrieval Encryption Scheme Under Cloud Environment [PDF]
Most existing public encryption schemes with keyword search are only suitable for the single user setting and do not allow users to launch a fuzzy retrieval.In order to solve this problem, an encryption scheme which can meet the demand of multiple users ...
WU Daini,WANG Xiaoming
doaj +1 more source
Encrypted Shared Data Spaces [PDF]
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content.
A. Wood +13 more
core +2 more sources
Efficient k-Resilient Public Key Authenticated Encryption with Keyword Search
Traditional encryption prioritises confidentiality but complicates search operations, requiring decryption before searches can be conducted. The public key encryption with keyword search (PEKS) scheme addresses this limitation by enabling authorised ...
Koon-Ming Chan +3 more
doaj +1 more source
Survey on public key encryption with equality test
As one of the important methods of solving the problem of computation over encrypted data under multiple public keys in cloud environment,public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under (possibly)
Yuanhao WANG +4 more
doaj +3 more sources
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation [PDF]
With the wide deployment of public cloud computing infrastructures, using clouds to host data query services has become an appealing solution for the advantages on scalability and cost-saving.
Chen, Keke, Guo, Shumin, Xu, Huiqi
core +1 more source

