Results 251 to 260 of about 2,775,007 (306)
Some of the next articles are maybe not open access.
IEEE Transactions on Services Computing, 2021
Searchable public key encryption (SPKE) is a useful public key cryptographic primitive that allows a user to perform keyword searches over publicly encrypted messages on an untrusted storage server while guaranteeing the privacy of the original messages ...
Yang Lu, Jiguo Li, Yicheng Zhang
semanticscholar +1 more source
Searchable public key encryption (SPKE) is a useful public key cryptographic primitive that allows a user to perform keyword searches over publicly encrypted messages on an untrusted storage server while guaranteeing the privacy of the original messages ...
Yang Lu, Jiguo Li, Yicheng Zhang
semanticscholar +1 more source
Multi-Writer Searchable Encryption
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019Multi-Writer Searchable Encryption, also known as public-key encryption with keyword search(PEKS), serves a wide spectrum of data sharing applications. It allows users to search over encrypted data encrypted via different keys. However, most of the existing PEKS schemes are built on classic security assumptions, which are proven to be untenable to ...
Lei Xu +4 more
openaire +1 more source
QPASE: Quantum-Resistant Password-Authenticated Searchable Encryption for Cloud Storage
IEEE Transactions on Information Forensics and SecuritySearchable encryption is a powerful tool that enables secure and private searches of encrypted data. It allows users to outsource their data to cloud servers while maintaining the confidentiality and privacy of their data.
Jingwei Jiang, Ding Wang
semanticscholar +1 more source
Error-Tolerant Searchable Encryption
2009 IEEE International Conference on Communications, 2009In this paper, we describe a new primitive for Error-Tolerant Searchable Encryption and a security model for it. This generic scheme permits to make searches on encrypted data with only an approximation of some keyword. It enables to efficiently query secure databases in order to get the exact data with a close estimation of it.
J. Bringer, H. Chabanne, B. Kindarji
openaire +1 more source
A Secure Data Sharing Based on Key Aggregate Searchable Encryption in Fog-Enabled IoT Environment
IEEE Transactions on Network Science and Engineering, 2022Cloud server and fog computing have been utilized to manage enormous volumes of data with low service transmission time in Internet of Things (IoT) environment. However, untrustworthy relationships between network entities and cloud server cause a lot of
Jihye Oh +5 more
semanticscholar +1 more source
Decryptable Searchable Encryption
2007As such, public-key encryption with keyword search (a.k.a PEKS or searchable encryption) does not allow the recipient to decrypt keywords i.e. encryption is not invertible. This paper introduces searchable encryption schemes which enable decryption. An additional feature is that the decryption key and the trapdoor derivation key are totally independent,
Thomas Fuhr, Pascal Paillier
openaire +1 more source
Computationally Efficient Searchable Symmetric Encryption
2010Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little information as possible to the server. In the symmetric searchable encryption domain, the storage and the retrieval are performed by the same client.
Liesdonk, van, P.P. +4 more
openaire +3 more sources
Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data Management
International Conference on Information and Knowledge ManagementWith the widespread development of database systems, data security has become crucial when it comes to sharing among users and servers. A straightforward approach involves using searchable encryption to ensure the confidentiality of shared data. However,
Shiyuan Xu +6 more
semanticscholar +1 more source
Multi-Client Cloud-Based Symmetric Searchable Encryption
IEEE Transactions on Dependable and Secure Computing, 2021We propose a multi-client Symmetric Searchable Encryption (SSE) scheme based on the single-user protocol [3] . The scheme allows any user to generate a search query by interacting with any $\theta -1$θ-1 ($\theta$θ is a threshold parameter) ‘helping ...
S. K. Kermanshahi +6 more
semanticscholar +1 more source
Updatable Searchable Symmetric Encryption: Definitions and Constructions
Theoretical Computer Science, 2023zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xiwen Wang +4 more
openaire +1 more source

