Results 251 to 260 of about 2,775,007 (306)
Some of the next articles are maybe not open access.

Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks

IEEE Transactions on Services Computing, 2021
Searchable public key encryption (SPKE) is a useful public key cryptographic primitive that allows a user to perform keyword searches over publicly encrypted messages on an untrusted storage server while guaranteeing the privacy of the original messages ...
Yang Lu, Jiguo Li, Yicheng Zhang
semanticscholar   +1 more source

Multi-Writer Searchable Encryption

Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Multi-Writer Searchable Encryption, also known as public-key encryption with keyword search(PEKS), serves a wide spectrum of data sharing applications. It allows users to search over encrypted data encrypted via different keys. However, most of the existing PEKS schemes are built on classic security assumptions, which are proven to be untenable to ...
Lei Xu   +4 more
openaire   +1 more source

QPASE: Quantum-Resistant Password-Authenticated Searchable Encryption for Cloud Storage

IEEE Transactions on Information Forensics and Security
Searchable encryption is a powerful tool that enables secure and private searches of encrypted data. It allows users to outsource their data to cloud servers while maintaining the confidentiality and privacy of their data.
Jingwei Jiang, Ding Wang
semanticscholar   +1 more source

Error-Tolerant Searchable Encryption

2009 IEEE International Conference on Communications, 2009
In this paper, we describe a new primitive for Error-Tolerant Searchable Encryption and a security model for it. This generic scheme permits to make searches on encrypted data with only an approximation of some keyword. It enables to efficiently query secure databases in order to get the exact data with a close estimation of it.
J. Bringer, H. Chabanne, B. Kindarji
openaire   +1 more source

A Secure Data Sharing Based on Key Aggregate Searchable Encryption in Fog-Enabled IoT Environment

IEEE Transactions on Network Science and Engineering, 2022
Cloud server and fog computing have been utilized to manage enormous volumes of data with low service transmission time in Internet of Things (IoT) environment. However, untrustworthy relationships between network entities and cloud server cause a lot of
Jihye Oh   +5 more
semanticscholar   +1 more source

Decryptable Searchable Encryption

2007
As such, public-key encryption with keyword search (a.k.a PEKS or searchable encryption) does not allow the recipient to decrypt keywords i.e. encryption is not invertible. This paper introduces searchable encryption schemes which enable decryption. An additional feature is that the decryption key and the trapdoor derivation key are totally independent,
Thomas Fuhr, Pascal Paillier
openaire   +1 more source

Computationally Efficient Searchable Symmetric Encryption

2010
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little information as possible to the server. In the symmetric searchable encryption domain, the storage and the retrieval are performed by the same client.
Liesdonk, van, P.P.   +4 more
openaire   +3 more sources

Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data Management

International Conference on Information and Knowledge Management
With the widespread development of database systems, data security has become crucial when it comes to sharing among users and servers. A straightforward approach involves using searchable encryption to ensure the confidentiality of shared data. However,
Shiyuan Xu   +6 more
semanticscholar   +1 more source

Multi-Client Cloud-Based Symmetric Searchable Encryption

IEEE Transactions on Dependable and Secure Computing, 2021
We propose a multi-client Symmetric Searchable Encryption (SSE) scheme based on the single-user protocol [3] . The scheme allows any user to generate a search query by interacting with any $\theta -1$θ-1 ($\theta$θ is a threshold parameter) ‘helping ...
S. K. Kermanshahi   +6 more
semanticscholar   +1 more source

Updatable Searchable Symmetric Encryption: Definitions and Constructions

Theoretical Computer Science, 2023
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xiwen Wang   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy