Results 61 to 70 of about 10,393 (185)

Keyword-Based Delegable Proofs of Storage

open access: yes, 2018
Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files.
C Wang   +11 more
core   +1 more source

A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data

open access: yes, 2018
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud ...
Li, Jiangnan   +2 more
core   +1 more source

GraphSE$^2$: An Encrypted Graph Database for Privacy-Preserving Social Search

open access: yes, 2019
In this paper, we propose GraphSE$^2$, an encrypted graph database for online social network services to address massive data breaches. GraphSE$^2$ preserves the functionality of social search, a key enabler for quality social network services, where ...
Beaver D.   +8 more
core   +1 more source

Private set intersection via public key encryption with keywords search [PDF]

open access: yesSecurity and Communication Networks, 2014
AbstractWe introduce the public key encryption with keywords search into the problem of secure two‐party computation and obtain a novel approach to accomplish private set intersection (PSI), which uses the public key encryption with keywords search as the basic tool.
Zhi‐Yi Shao, Bo Yang
openaire   +1 more source

Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search over Encrypted Cloud Data

open access: yes, 2019
Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD).
Abedin, Zain Ul   +5 more
core   +1 more source

Comment on “Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups”

open access: yesIEEE Access
The public key encryption with keyword search (PEKS) scheme is a cryptographic primitive that allows a cloud server to search for a ciphertext without knowing the corresponding keyword used in the search.
Koon-Ming Chan   +3 more
doaj   +1 more source

Privacy-Preserving Genetic Relatedness Test [PDF]

open access: yes, 2016
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano   +2 more
core   +1 more source

A Secure Key-Aggregate Keyword Retrieval Scheme Over Encrypted Data in Cloud Computing

open access: yesIEEE Access
Key-aggregate keyword retrieval primitive enables a cloud server on behalf of delegated users to securely perform a keyword search over the data encrypted with various public keys.
Chunwei Lou   +6 more
doaj   +1 more source

A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment

open access: yesIEEE Access, 2019
Currently, the security situation of data security and user privacy protection is increasingly serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy disclosure.
Lihua Liu   +3 more
doaj   +1 more source

A PEKS-Based NDN Strategy for Name Privacy

open access: yesFuture Internet, 2020
Named Data Networking (NDN), where addressable content name is used, is considered as a candidate of next-generation Internet architectures. NDN routers use In-Network cache to replicate and store passing packets to make faster content delivery.
Kyi Thar Ko   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy