A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks
Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data
Binrui Zhu +5 more
doaj +1 more source
Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search
In email system, the cryptography technology has been used to defend email secrets, so it is important to search specific encrypted emails on cloud sever without local decryption.
Yulei Zhang +3 more
doaj +1 more source
Lattice-Based Searchable Encryption With Keywords Revocable and Bounded Trapdoor Exposure Resistance
Searchable encryption plays a vital role in keeping data privacy of current cloud storage. Considering the security threat of trapdoor exposure, Emura et al. introduced a formal definition of keywords revocable public-key encryption with keywords search (
Xiaoling Yu, Chungen Xu, Lei Xu
doaj +1 more source
Dual Server Public Key Authenticated Encryption with Keyword Search
Journal on Dual server public key authenticated encryption with keyword ...
openaire +1 more source
Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data
With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern.
Danial Shiraly +2 more
doaj +1 more source
Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing
The privacy of users must be considered as the utmost priority in distributed networks. To protect the identities of users, attribute-based encryption (ABE) was presented by Sahai et al.
Huijun Zhu +3 more
doaj +1 more source
Public-Key Authenticated Encryption with Keyword Search Made Easy
Public-key searchable encryption allows keyword-associated tokens to be used to test if a ciphertext contains specific keywords. Due to the low entropies of keywords, the token holder can create ciphertexts from candidate keywords and test them using the token in hand to recover the keywords, known as inside keyword guessing attacks (IKGA). Public-
Qinyi Li, Xavier Boyen
openaire +2 more sources
EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH [PDF]
B. MORGAN, M. HAMADA, G. ABDEFADEL
openaire +1 more source
Searchable encryption with randomized ciphertext and randomized keyword search
The notion of public-key encryption with keyword search (PEKS) was introduced to search over encrypted data without performing any decryption. In this article, we propose a PEKS scheme in which both the encrypted keyword and the trapdoor are randomized ...
Calderini Marco +3 more
doaj +1 more source
A blockchain searchable encryption scheme for legal data shared by multiple parties
The national judicial system has put forward higher requirements for the sharing of legal data, but existing legal data sharing schemes still have some problems, such as weak data security, unrestricted user access.
Zemin Wang
doaj +1 more source

