Results 71 to 80 of about 10,393 (185)

A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks

open access: yesSensors, 2019
Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data
Binrui Zhu   +5 more
doaj   +1 more source

Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search

open access: yesIEEE Access, 2019
In email system, the cryptography technology has been used to defend email secrets, so it is important to search specific encrypted emails on cloud sever without local decryption.
Yulei Zhang   +3 more
doaj   +1 more source

Lattice-Based Searchable Encryption With Keywords Revocable and Bounded Trapdoor Exposure Resistance

open access: yesIEEE Access, 2019
Searchable encryption plays a vital role in keeping data privacy of current cloud storage. Considering the security threat of trapdoor exposure, Emura et al. introduced a formal definition of keywords revocable public-key encryption with keywords search (
Xiaoling Yu, Chungen Xu, Lei Xu
doaj   +1 more source

Dual Server Public Key Authenticated Encryption with Keyword Search

open access: yes, 2023
Journal on Dual server public key authenticated encryption with keyword ...
openaire   +1 more source

Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern.
Danial Shiraly   +2 more
doaj   +1 more source

Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing

open access: yesIEEE Access, 2017
The privacy of users must be considered as the utmost priority in distributed networks. To protect the identities of users, attribute-based encryption (ABE) was presented by Sahai et al.
Huijun Zhu   +3 more
doaj   +1 more source

Public-Key Authenticated Encryption with Keyword Search Made Easy

open access: yesIACR Communications in Cryptology
Public-key searchable encryption allows keyword-associated tokens to be used to test if a ciphertext contains specific keywords. Due to the low entropies of keywords, the token holder can create ciphertexts from candidate keywords and test them using the token in hand to recover the keywords, known as inside keyword guessing attacks (IKGA). Public-
Qinyi Li, Xavier Boyen
openaire   +2 more sources

EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH [PDF]

open access: yesJES. Journal of Engineering Sciences, 2010
B. MORGAN, M. HAMADA, G. ABDEFADEL
openaire   +1 more source

Searchable encryption with randomized ciphertext and randomized keyword search

open access: yesJournal of Mathematical Cryptology
The notion of public-key encryption with keyword search (PEKS) was introduced to search over encrypted data without performing any decryption. In this article, we propose a PEKS scheme in which both the encrypted keyword and the trapdoor are randomized ...
Calderini Marco   +3 more
doaj   +1 more source

A blockchain searchable encryption scheme for legal data shared by multiple parties

open access: yesJournal of Applied Science and Engineering
The national judicial system has put forward higher requirements for the sharing of legal data, but existing legal data sharing schemes still have some problems, such as weak data security, unrestricted user access.
Zemin Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy