Results 231 to 240 of about 8,870 (281)

Searchable encryption through dispersion

2014 IEEE Central America and Panama Convention (CONCAPAN XXXIV), 2014
Cryptography is the universal tool to protect the privacy of data. Today's cryptography still requires encrypted data to be decrypted before it can be searched. We propose here an alternative way of protecting the privacy of data through dispersion of a compressed version of the original data that can be searched without recovering the original data ...
Aiello, Carlos   +2 more
openaire   +2 more sources

Searchable symmetric encryption: Improved definitions and efficient constructions [PDF]

open access: possibleJournal of Computer Security, 2006
Searchable symmetric encryption (SSE) allows a party to outsource the storage of his data to another party in a private manner, while maintaining the ability to selectively search over it. This problem has been the focus of active research and several security definitions and constructions have been proposed.
Reza Curtmola   +3 more
openaire   +1 more source

Deniable Searchable Symmetric Encryption

Information Sciences, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Huige, Zhang, Fangguo, Fan, Chun-I
openaire   +2 more sources

Designated-ciphertext searchable encryption

Journal of Information Security and Applications, 2021
Abstract Public-key encryption with keyword search (PEKS), proposed by Boneh et al. (2004), allows users to search encrypted keywords without losing data privacy. Although extensive studies have been conducted on this topic, only a few have focused on insider-keyword-guessing attacks (IKGA) that can reveal a user’s sensitive information.
Zi-Yuan Liu   +3 more
openaire   +2 more sources

Searchable Symmetric Encryption

ACM Computing Surveys, 2017
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data without the risk of data leakage. Despite the widespread interest, existing surveys do not examine in detail how SSE’s underlying structures are designed and how these result in the many properties of a SSE scheme.
Poh, Geong Sen   +4 more
openaire   +2 more sources

Witness-based searchable encryption

Information Sciences, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sha Ma, Yi Mu, Willy Susilo, Bo Yang
openaire   +3 more sources

Multi-Writer Searchable Encryption

Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Multi-Writer Searchable Encryption, also known as public-key encryption with keyword search(PEKS), serves a wide spectrum of data sharing applications. It allows users to search over encrypted data encrypted via different keys. However, most of the existing PEKS schemes are built on classic security assumptions, which are proven to be untenable to ...
Lei Xu   +4 more
openaire   +1 more source

Error-Tolerant Searchable Encryption

2009 IEEE International Conference on Communications, 2009
In this paper, we describe a new primitive for Error-Tolerant Searchable Encryption and a security model for it. This generic scheme permits to make searches on encrypted data with only an approximation of some keyword. It enables to efficiently query secure databases in order to get the exact data with a close estimation of it.
J. Bringer, H. Chabanne, B. Kindarji
openaire   +1 more source

Home - About - Disclaimer - Privacy