Results 1 to 10 of about 8,870 (281)

Shared and searchable encrypted data for untrusted servers [PDF]

open access: yes, 2011
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu   +2 more
core   +1 more source

SoK: Cryptographically Protected Database Search [PDF]

open access: yes, 2017
Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches.
Cunningham, Robert K.   +8 more
core   +1 more source

A keyword searchable attribute-based encryption scheme with attribute update for cloud storage. [PDF]

open access: yesPLoS ONE, 2018
Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primitive, which is very suitable for data cloud storage for its fine-grained access control.
Shangping Wang, Jian Ye, Yaling Zhang
doaj   +1 more source

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]

open access: yes, 2017
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu   +4 more
core   +1 more source

Privacy preserving encrypted phonetic search of speech data [PDF]

open access: yes, 2017
This paper presents a strategy for enabling speech recognition to be performed in the cloud whilst preserving the privacy of users. The approach advocates a demarcation of responsibilities between the client and server-side components for performing the ...
Cannings, N.   +15 more
core   +2 more sources

Multi-server conjunctive keyword searchable encryption scheme based on BDH problem

open access: yesDianxin kexue, 2020
Searchable encryption is a cryptographic primitive that supports users to search for keywords on ciphertext.In view of the low efficiency of traditional single-server searchable encryption schemes,it was based on the advantages of identity management in ...
Yanhua LU, Youliang TIAN, Chen LIU
doaj   +2 more sources

Overview of searchable encryption research

open access: yes网络与信息安全学报, 2018
With the development of cloud computing,there is an increasing number of companies and individuals outsourcing their data to cloud server in the encrypted form to protect data security and user privacy.As a result,efficient retrieval of encrypted data ...
Ying LI,Chunguang MA
doaj   +3 more sources

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption [PDF]

open access: yesJournal of Universal Computer Science, 2019
Searchable encryption enables the data owner to outsource their data to the cloud server while retaining the search ability. Recently, some researchers proposed a variant of searchable encryption, named single-writer/multi-reader searchable encryption ...
Yunling Wang   +7 more
doaj   +3 more sources

Privacy-Preserving Genetic Relatedness Test [PDF]

open access: yes, 2016
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano   +2 more
core   +1 more source

HardIDX: Practical and Secure Index with SGX [PDF]

open access: yes, 2017
Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that
A Boldyreva   +13 more
core   +4 more sources

Home - About - Disclaimer - Privacy