Results 11 to 20 of about 2,775,007 (306)

Registered Keyword Searchable Encryption Based on SM9

open access: yesApplied Sciences, 2023
The SM9 algorithm is an Identity-Based Encryption (IBE) algorithm independently made by China. The existing SM9 searchable encryption scheme cannot be effective against insider keyword guessing attacks and violates users’ data privacy.
Haoyu Zhang, Baodong Qin, Dong Zheng
doaj   +1 more source

Smart Contract-Assisted Dynamically Searchable Encryption Scheme with Forward and Backward Security [PDF]

open access: yesJisuanji gongcheng, 2022
The dynamic searchable encryption process is vulnerable to file injection attacks and information abuseattacks caused by information leakage.Furthermore, the existing dynamic searchable encryption schemes based on public key cryptosystem often involve a ...
DING Xiaohui, CAO Suzhen, WANG Caifen
doaj   +1 more source

Homomorphic Encryption: An Analysis of its Applications in Searchable Encryption [PDF]

open access: yesMathematics, 2023
The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it has also raised concerns regarding the privacy of sensitive data. To address these concerns, encryption techniques have been widely used.
Ivone Amorim, Iva Costa
semanticscholar   +1 more source

A Searchable Encryption with Forward/Backward Security and Constant Storage

open access: yesApplied Sciences, 2023
Dynamic searchable encryption satisfies users’ needs for ciphertext retrieval on semi-trusted servers, while allowing users to update server-side data.
Suzhen Cao   +3 more
doaj   +1 more source

A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing

open access: yesIEEE Access, 2020
Data sharing through the cloud is flourishing with the development of cloud computing technology. The new wave of technology will also give rise to new security challenges, particularly the data confidentiality in cloud-based sharing applications ...
Biwen Chen   +4 more
doaj   +1 more source

Fuzzy Keyword Searchable Encryption Scheme Based on Blockchain

open access: yesInformation, 2022
Searchable encryption is a keyword-based ciphertext retrieval scheme, which can selectively retrieve encrypted documents on encrypted cloud data. Most existing searchable encryption schemes focus only on exact keyword searches and cannot return data of ...
Yongbo Jiang, Juncheng Lu, Tao Feng
doaj   +1 more source

Searchable encryption scheme based on attribute policy hiding in a cloud environment

open access: yes网络与信息安全学报, 2022
Attribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker ...
Yihua ZHOU, Xinyu HU, Meiqi LI, Yuguang YANG
doaj   +3 more sources

Dynamic Searchable Encryption Scheme Based on Identity [PDF]

open access: yesJisuanji gongcheng, 2019
Searchable encryption technology saves user’s local storage resources and simplifies user’s search operation.However,most searchable encryption schemes are only static search.Therefore,this paper presents a dynamic searchable encryption scheme based on ...
NI Lulin,XU Chungen
doaj   +1 more source

Efficient Searchable Encryption Scheme in Unsecure Channel [PDF]

open access: yesJisuanji gongcheng, 2019
In order to securely retrieve the ciphertext data in cloud storage technology,a searchable encryption scheme in unsecure channel is proposed,and a general method for converting the dual-system encryption scheme into the dual-system searchable encryption ...
CHENG Jinxue, XU, XU Lei, ZHAO Zemao, XUE Chunyang
doaj   +1 more source

Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

open access: yesJournal of Cloud Computing, 2023
With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to achieve the above goal.
Liang Yan   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy