Results 11 to 20 of about 2,775,007 (306)
Registered Keyword Searchable Encryption Based on SM9
The SM9 algorithm is an Identity-Based Encryption (IBE) algorithm independently made by China. The existing SM9 searchable encryption scheme cannot be effective against insider keyword guessing attacks and violates users’ data privacy.
Haoyu Zhang, Baodong Qin, Dong Zheng
doaj +1 more source
Smart Contract-Assisted Dynamically Searchable Encryption Scheme with Forward and Backward Security [PDF]
The dynamic searchable encryption process is vulnerable to file injection attacks and information abuseattacks caused by information leakage.Furthermore, the existing dynamic searchable encryption schemes based on public key cryptosystem often involve a ...
DING Xiaohui, CAO Suzhen, WANG Caifen
doaj +1 more source
Homomorphic Encryption: An Analysis of its Applications in Searchable Encryption [PDF]
The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it has also raised concerns regarding the privacy of sensitive data. To address these concerns, encryption techniques have been widely used.
Ivone Amorim, Iva Costa
semanticscholar +1 more source
A Searchable Encryption with Forward/Backward Security and Constant Storage
Dynamic searchable encryption satisfies users’ needs for ciphertext retrieval on semi-trusted servers, while allowing users to update server-side data.
Suzhen Cao +3 more
doaj +1 more source
A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing
Data sharing through the cloud is flourishing with the development of cloud computing technology. The new wave of technology will also give rise to new security challenges, particularly the data confidentiality in cloud-based sharing applications ...
Biwen Chen +4 more
doaj +1 more source
Fuzzy Keyword Searchable Encryption Scheme Based on Blockchain
Searchable encryption is a keyword-based ciphertext retrieval scheme, which can selectively retrieve encrypted documents on encrypted cloud data. Most existing searchable encryption schemes focus only on exact keyword searches and cannot return data of ...
Yongbo Jiang, Juncheng Lu, Tao Feng
doaj +1 more source
Searchable encryption scheme based on attribute policy hiding in a cloud environment
Attribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker ...
Yihua ZHOU, Xinyu HU, Meiqi LI, Yuguang YANG
doaj +3 more sources
Dynamic Searchable Encryption Scheme Based on Identity [PDF]
Searchable encryption technology saves user’s local storage resources and simplifies user’s search operation.However,most searchable encryption schemes are only static search.Therefore,this paper presents a dynamic searchable encryption scheme based on ...
NI Lulin,XU Chungen
doaj +1 more source
Efficient Searchable Encryption Scheme in Unsecure Channel [PDF]
In order to securely retrieve the ciphertext data in cloud storage technology,a searchable encryption scheme in unsecure channel is proposed,and a general method for converting the dual-system encryption scheme into the dual-system searchable encryption ...
CHENG Jinxue, XU, XU Lei, ZHAO Zemao, XUE Chunyang
doaj +1 more source
With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to achieve the above goal.
Liang Yan +5 more
semanticscholar +1 more source

