Results 1 to 10 of about 2,429,256 (262)

A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data [PDF]

open access: greenarXiv, 2018
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud. However, while encryption provides confidentiality to data, it also sacrifices the data owners' ability ...
Li, Jiangnan   +2 more
arxiv   +5 more sources

Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version) [PDF]

open access: yes2014 Twelfth Annual International Conference on Privacy, Security and Trust, 2008
Searchable encryption is a technique that allows a client to store data in encrypted form on a curious server, such that data can be retrieved while leaking a minimal amount of information to the server.
Doumen, J.M.   +3 more
core   +21 more sources

Homomorphic Encryption: An Analysis of its Applications in Searchable Encryption [PDF]

open access: yesMathematics 2023, 11(13), 2948, 2023
The widespread adoption of cloud infrastructures has revolutionised data storage and access. However, it has also raised concerns regarding the privacy of sensitive data stored in the cloud. To address these concerns, encryption techniques have been widely used.
Ivone Amorim, Iva Costa
arxiv   +3 more sources

An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network. [PDF]

open access: yesSensors (Basel), 2022
The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other.
Ali A   +7 more
europepmc   +2 more sources

Rethinking Searchable Symmetric Encryption

open access: yes2023 IEEE Symposium on Security and Privacy (SP), 2023
ISBN:978-1-6654-9336 ...
Gui, Zichen   +2 more
openaire   +3 more sources

A Comparative Study of Homomorphic and Searchable Encryption Schemes for Cloud Computing [PDF]

open access: greenarXiv, 2015
Cloud computing is a popular distributed network and utility model based technology. Since in cloud the data is outsourced to third parties, the protection of confidentiality and privacy of user data becomes important. Different methods for securing the data in cloud have been proposed by researchers including but not limited to Oblivious RAM ...
B T Prasanna, C. B. Akki
arxiv   +3 more sources

Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage. [PDF]

open access: yesPLoS ONE, 2016
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly.
Shangping Wang   +2 more
doaj   +2 more sources

The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption [PDF]

open access: yesNDSS 2023
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studies a new and practical security risk to DSSE, namely, secret key compromise (e.g., a user's secret key is leaked or stolen), which ...
Tianyang Chen   +6 more
arxiv   +3 more sources

Certificateless Searchable Encryption Scheme in Multi-User Environment [PDF]

open access: goldCryptography, 2022
Searchable encryption technology enables users to access data that has been made publicly encrypted without divulging the original content. The majority of the currently available multi-user certificateless searchable encryption technologies are based on
Tao Feng, Jiewen Si
doaj   +2 more sources

A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods [PDF]

open access: yesThe Scientific World Journal, 2014
Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud.
Guangchun Luo   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy