Results 1 to 10 of about 8,870 (281)
Shared and searchable encrypted data for untrusted servers [PDF]
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu +2 more
core +1 more source
SoK: Cryptographically Protected Database Search [PDF]
Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches.
Cunningham, Robert K. +8 more
core +1 more source
A keyword searchable attribute-based encryption scheme with attribute update for cloud storage. [PDF]
Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primitive, which is very suitable for data cloud storage for its fine-grained access control.
Shangping Wang, Jian Ye, Yaling Zhang
doaj +1 more source
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu +4 more
core +1 more source
Privacy preserving encrypted phonetic search of speech data [PDF]
This paper presents a strategy for enabling speech recognition to be performed in the cloud whilst preserving the privacy of users. The approach advocates a demarcation of responsibilities between the client and server-side components for performing the ...
Cannings, N. +15 more
core +2 more sources
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
Searchable encryption is a cryptographic primitive that supports users to search for keywords on ciphertext.In view of the low efficiency of traditional single-server searchable encryption schemes,it was based on the advantages of identity management in ...
Yanhua LU, Youliang TIAN, Chen LIU
doaj +2 more sources
Overview of searchable encryption research
With the development of cloud computing,there is an increasing number of companies and individuals outsourcing their data to cloud server in the encrypted form to protect data security and user privacy.As a result,efficient retrieval of encrypted data ...
Ying LI,Chunguang MA
doaj +3 more sources
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption [PDF]
Searchable encryption enables the data owner to outsource their data to the cloud server while retaining the search ability. Recently, some researchers proposed a variant of searchable encryption, named single-writer/multi-reader searchable encryption ...
Yunling Wang +7 more
doaj +3 more sources
Privacy-Preserving Genetic Relatedness Test [PDF]
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano +2 more
core +1 more source
HardIDX: Practical and Secure Index with SGX [PDF]
Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that
A Boldyreva +13 more
core +4 more sources

