Results 1 to 10 of about 10,983 (307)

BloomSec: Scalable and privacy-preserving searchable encryption for cloud environments. [PDF]

open access: yesPLoS ONE
The utilization of on-demand remote cloud services provides a flexible way to fulfill the demands of emerging resource-intensive applications. However, migrating data to the cloud also introduced security threats, including unauthorized access and ...
Abdul Nasir Khan   +5 more
doaj   +2 more sources

Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage. [PDF]

open access: yesPLoS ONE, 2016
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly.
Shangping Wang   +2 more
doaj   +2 more sources

A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods [PDF]

open access: yesThe Scientific World Journal, 2014
Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud.
Guangchun Luo   +3 more
doaj   +2 more sources

Analysis and Improvement of Searchable Encryption Scheme Based on Composite-Order Bilinear Pairs [PDF]

open access: yesJisuanji gongcheng, 2020
Searchable encryption,as the core technology of secure search,enables data storage servers to retrieve data under ciphertext.However,the existing searchable encryption scheme without secure channel fail to resist off-line keyword guessing attacks ...
DENG Zhihui, WANG Shaohui, WANG Ping
doaj   +1 more source

Certificateless Searchable Encryption Scheme in Multi-User Environment

open access: yesCryptography, 2022
Searchable encryption technology enables users to access data that has been made publicly encrypted without divulging the original content. The majority of the currently available multi-user certificateless searchable encryption technologies are based on
Tao Feng, Jiewen Si
doaj   +1 more source

Privacy Preserving and Serverless Homomorphic-Based Searchable Encryption as a Service (SEaaS)

open access: yesIEEE Access, 2023
Serverless computing has seen rapid growth, thanks to its adaptability, elasticity, and deployment agility, embraced by both cloud providers and users. However, this surge in serverless adoption has prompted a reevaluation of security concerns and thus ...
Musfirah Ihtesham   +6 more
doaj   +1 more source

Research on the searchable encryption

open access: yes网络与信息安全学报, 2016
Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and ...
Peng XU, Hai JIN
doaj   +3 more sources

Registered Keyword Searchable Encryption Based on SM9

open access: yesApplied Sciences, 2023
The SM9 algorithm is an Identity-Based Encryption (IBE) algorithm independently made by China. The existing SM9 searchable encryption scheme cannot be effective against insider keyword guessing attacks and violates users’ data privacy.
Haoyu Zhang, Baodong Qin, Dong Zheng
doaj   +1 more source

An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time

open access: yesIEEE Access, 2021
Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography.
Lidong Han   +4 more
doaj   +1 more source

Smart Contract-Assisted Dynamically Searchable Encryption Scheme with Forward and Backward Security [PDF]

open access: yesJisuanji gongcheng, 2022
The dynamic searchable encryption process is vulnerable to file injection attacks and information abuseattacks caused by information leakage.Furthermore, the existing dynamic searchable encryption schemes based on public key cryptosystem often involve a ...
DING Xiaohui, CAO Suzhen, WANG Caifen
doaj   +1 more source

Home - About - Disclaimer - Privacy