Results 61 to 70 of about 10,393 (185)
Keyword-Based Delegable Proofs of Storage
Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files.
C Wang +11 more
core +1 more source
A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud ...
Li, Jiangnan +2 more
core +1 more source
GraphSE$^2$: An Encrypted Graph Database for Privacy-Preserving Social Search
In this paper, we propose GraphSE$^2$, an encrypted graph database for online social network services to address massive data breaches. GraphSE$^2$ preserves the functionality of social search, a key enabler for quality social network services, where ...
Beaver D. +8 more
core +1 more source
Private set intersection via public key encryption with keywords search [PDF]
AbstractWe introduce the public key encryption with keywords search into the problem of secure two‐party computation and obtain a novel approach to accomplish private set intersection (PSI), which uses the public key encryption with keywords search as the basic tool.
Zhi‐Yi Shao, Bo Yang
openaire +1 more source
Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD).
Abedin, Zain Ul +5 more
core +1 more source
The public key encryption with keyword search (PEKS) scheme is a cryptographic primitive that allows a cloud server to search for a ciphertext without knowing the corresponding keyword used in the search.
Koon-Ming Chan +3 more
doaj +1 more source
Privacy-Preserving Genetic Relatedness Test [PDF]
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano +2 more
core +1 more source
A Secure Key-Aggregate Keyword Retrieval Scheme Over Encrypted Data in Cloud Computing
Key-aggregate keyword retrieval primitive enables a cloud server on behalf of delegated users to securely perform a keyword search over the data encrypted with various public keys.
Chunwei Lou +6 more
doaj +1 more source
A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment
Currently, the security situation of data security and user privacy protection is increasingly serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy disclosure.
Lihua Liu +3 more
doaj +1 more source
A PEKS-Based NDN Strategy for Name Privacy
Named Data Networking (NDN), where addressable content name is used, is considered as a candidate of next-generation Internet architectures. NDN routers use In-Network cache to replicate and store passing packets to make faster content delivery.
Kyi Thar Ko +2 more
doaj +1 more source

