Results 1 to 10 of about 2,774,888 (187)

An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network. [PDF]

open access: yesSensors (Basel), 2022
The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other.
Ali A   +7 more
europepmc   +2 more sources

BloomSec: Scalable and privacy-preserving searchable encryption for cloud environments. [PDF]

open access: yesPLoS ONE
The utilization of on-demand remote cloud services provides a flexible way to fulfill the demands of emerging resource-intensive applications. However, migrating data to the cloud also introduced security threats, including unauthorized access and ...
Abdul Nasir Khan   +5 more
doaj   +2 more sources

Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage. [PDF]

open access: yesPLoS ONE, 2016
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly.
Shangping Wang   +2 more
doaj   +2 more sources

A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods [PDF]

open access: yesThe Scientific World Journal, 2014
Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud.
Guangchun Luo   +3 more
doaj   +2 more sources

A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents [PDF]

open access: yesUSENIX Security Symposium, 2023
Cloud data storage solutions offer customers cost-effective and reduced data management. While attractive, data security issues remain to be a core concern.
Marc Damie, Florian Hahn, Andreas Peter
semanticscholar   +1 more source

Analysis and Improvement of Searchable Encryption Scheme Based on Composite-Order Bilinear Pairs [PDF]

open access: yesJisuanji gongcheng, 2020
Searchable encryption,as the core technology of secure search,enables data storage servers to retrieve data under ciphertext.However,the existing searchable encryption scheme without secure channel fail to resist off-line keyword guessing attacks ...
DENG Zhihui, WANG Shaohui, WANG Ping
doaj   +1 more source

Certificateless Searchable Encryption Scheme in Multi-User Environment

open access: yesCryptography, 2022
Searchable encryption technology enables users to access data that has been made publicly encrypted without divulging the original content. The majority of the currently available multi-user certificateless searchable encryption technologies are based on
Tao Feng, Jiewen Si
doaj   +1 more source

Privacy Preserving and Serverless Homomorphic-Based Searchable Encryption as a Service (SEaaS)

open access: yesIEEE Access, 2023
Serverless computing has seen rapid growth, thanks to its adaptability, elasticity, and deployment agility, embraced by both cloud providers and users. However, this surge in serverless adoption has prompted a reevaluation of security concerns and thus ...
Musfirah Ihtesham   +6 more
doaj   +1 more source

Research on the searchable encryption

open access: yes网络与信息安全学报, 2016
Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and ...
Peng XU, Hai JIN
doaj   +3 more sources

An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time

open access: yesIEEE Access, 2021
Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography.
Lidong Han   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy