ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments
Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of ...
Asghar, Muhammad Rizwan +3 more
core
Public-key authenticated encryption with keyword search (PAEKS) is a novel cryptographic primitive to resist against keyword-guessing attacks (KGAs) and preserve the privacy of keywords in both ciphertexts and trapdoors.
Nan Zhang, Baodong Qin, Dong Zheng
doaj +1 more source
Multi-keyword public key searchable encryption scheme with pattern hiding
To address the limitations of existing multi-user searchable encryption (SE) schemes that fail to hide access patterns, search patterns, and resist keyword guessing attacks, a novel public-key searchable encryption scheme was proposed supporting multi ...
NIE Xuyun +6 more
doaj
BloomSec: Scalable and privacy-preserving searchable encryption for cloud environments. [PDF]
Khan AN +5 more
europepmc +1 more source
Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack
Satoshi Obana, Kaito Uemura
openaire +1 more source
DS-CKDSE: A Dual-Server Conjunctive Keyword Dynamic Searchable Encryption with Forward and Backward Security. [PDF]
Sun H, Liu Y, Zhang Y, Li C.
europepmc +1 more source
A Blockchain-Enabled Multi-Authority Secure IoT Data-Sharing Scheme with Attribute-Based Searchable Encryption for Intelligent Systems. [PDF]
Zhang F, Xia X, Gao H, Ma Z, Chen X.
europepmc +1 more source
Secure electronic health record access control via blockchain, dual-attribute encryption, and large language model-based attribute extraction. [PDF]
Nekouie A +3 more
europepmc +1 more source
SENSH: a blockchain-based searchable encrypted data sharing scheme in smart healthcare. [PDF]
Luo S, Tan L, Hu T, Hu M.
europepmc +1 more source
SPKSE: secure public key searchable encryption withstand keyword guessing attacks. [PDF]
Shi D, Xu M, Cao C, Cheng H.
europepmc +1 more source

