Results 231 to 240 of about 8,870 (281)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Searchable encryption through dispersion
2014 IEEE Central America and Panama Convention (CONCAPAN XXXIV), 2014Cryptography is the universal tool to protect the privacy of data. Today's cryptography still requires encrypted data to be decrypted before it can be searched. We propose here an alternative way of protecting the privacy of data through dispersion of a compressed version of the original data that can be searched without recovering the original data ...
Aiello, Carlos +2 more
openaire +2 more sources
Searchable symmetric encryption: Improved definitions and efficient constructions [PDF]
Searchable symmetric encryption (SSE) allows a party to outsource the storage of his data to another party in a private manner, while maintaining the ability to selectively search over it. This problem has been the focus of active research and several security definitions and constructions have been proposed.
Reza Curtmola +3 more
openaire +1 more source
Deniable Searchable Symmetric Encryption
Information Sciences, 2017zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Huige, Zhang, Fangguo, Fan, Chun-I
openaire +2 more sources
Designated-ciphertext searchable encryption
Journal of Information Security and Applications, 2021Abstract Public-key encryption with keyword search (PEKS), proposed by Boneh et al. (2004), allows users to search encrypted keywords without losing data privacy. Although extensive studies have been conducted on this topic, only a few have focused on insider-keyword-guessing attacks (IKGA) that can reveal a user’s sensitive information.
Zi-Yuan Liu +3 more
openaire +2 more sources
Searchable Symmetric Encryption
ACM Computing Surveys, 2017Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data without the risk of data leakage. Despite the widespread interest, existing surveys do not examine in detail how SSE’s underlying structures are designed and how these result in the many properties of a SSE scheme.
Poh, Geong Sen +4 more
openaire +2 more sources
Witness-based searchable encryption
Information Sciences, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sha Ma, Yi Mu, Willy Susilo, Bo Yang
openaire +3 more sources
Multi-Writer Searchable Encryption
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019Multi-Writer Searchable Encryption, also known as public-key encryption with keyword search(PEKS), serves a wide spectrum of data sharing applications. It allows users to search over encrypted data encrypted via different keys. However, most of the existing PEKS schemes are built on classic security assumptions, which are proven to be untenable to ...
Lei Xu +4 more
openaire +1 more source
Error-Tolerant Searchable Encryption
2009 IEEE International Conference on Communications, 2009In this paper, we describe a new primitive for Error-Tolerant Searchable Encryption and a security model for it. This generic scheme permits to make searches on encrypted data with only an approximation of some keyword. It enables to efficiently query secure databases in order to get the exact data with a close estimation of it.
J. Bringer, H. Chabanne, B. Kindarji
openaire +1 more source

