Results 261 to 270 of about 2,775,007 (306)
Some of the next articles are maybe not open access.
Understanding Leakage in Searchable Encryption: a Quantitative Approach
Proceedings on Privacy Enhancing TechnologiesSearchable encryption, or more generally, structured encryption, permits search over encrypted data. It is an important cryptographic tool for securing cloud storage.
A. Boldyreva, Zichen Gui, B. Warinschi
semanticscholar +1 more source
IEEE transactions on consumer electronics
With the flourishing development of philanthropy, more and more people are actively involved in charitable activities. However, traditional charitable systems face several challenges, including low levels of information, lack of transparency in the flow ...
Buzhen He +4 more
semanticscholar +1 more source
With the flourishing development of philanthropy, more and more people are actively involved in charitable activities. However, traditional charitable systems face several challenges, including low levels of information, lack of transparency in the flow ...
Buzhen He +4 more
semanticscholar +1 more source
Dynamic searchable symmetric encryption
Proceedings of the 2012 ACM conference on Computer and communications security, 2012Searchable symmetric encryption (SSE) allows a client to encrypt its data in such a way that this data can still be searched. The most immediate application of SSE is to cloud storage, where it enables a client to securely outsource its data to an untrusted cloud provider without sacrificing the ability to search over it.SSE has been the focus of ...
Seny Kamara +2 more
openaire +1 more source
Boolean symmetric searchable encryption
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013In this article we tackle the issue of searchable encryption with a generalized query model. Departing from many previous works that focused on queries consisting of a single keyword, we consider the the case of queries consisting of arbitrary boolean expressions on keywords, that is to say conjunctions and disjunctions of keywords and their complement.
Tarik Moataz, Abdullatif Shikfa
openaire +1 more source
Unconditionally secure searchable encryption
2017 51st Annual Conference on Information Sciences and Systems (CISS), 2017Searchable symmetric encryption (SSE) enables us to search encrypted data with an arbitrarily chosen keyword without leaking information on the data and keyword. SSE is expected to be used in, for example, cloud computing and genome analyses. In particular, privacy of genome data must be guaranteed for long periods, and therefore unconditionally secure
Takahiro Yoshizawa +2 more
openaire +1 more source
Broadcast Searchable Keyword Encryption
2014 IEEE 17th International Conference on Computational Science and Engineering, 2014Broadcast Searchable Keywords Encryption (BSKE) is a novel scheme that allows searching in encrypted data without knowing a secret key. Consider Bob wants to encrypt the same data under master public key for a group of users and stores this encrypted data with Alice, Malice is one of those recipients he asks Alice using his private key whether or not ...
Mohamed Ali +5 more
openaire +1 more source
IEEE Transactions on Mobile Computing
Public key encryption with equality test (PKE-ET) is a novel cryptosystem to deal with the problem of multi-public-key encrypted data computing. It can be used to verify if different ciphertexts are encryptions of same plaintext under different public ...
Jinmei Tian, Yang Lu, Jiguo Li
semanticscholar +1 more source
Public key encryption with equality test (PKE-ET) is a novel cryptosystem to deal with the problem of multi-public-key encrypted data computing. It can be used to verify if different ciphertexts are encryptions of same plaintext under different public ...
Jinmei Tian, Yang Lu, Jiguo Li
semanticscholar +1 more source
Searchable Encryption for Outsourced Data Analytics
2011Two sets of privacy requirements need to be fulfilled when a company's accounting data is audited by an external party: the company needs to safeguard its data, while the auditors do not want to reveal their investigation methods. This problem is usually addressed by physically isolating data and auditors during the course of an audit.
Kerschbaum F., Sorniotti A.
openaire +1 more source
Asymmetric Searchable Encryption from Inner Product Encryption
2016Asymmetric searchable encryption(ASE) enables one to retrieve encrypted data stored on an untrusted server without revealing the contents. Now, beyond single keyword search, more and more attention have already been paid to the problem of multi-keyword search. However, existing schemes are mainly based on composite-order bilinear groups. In this paper,
Siyu Xiao +4 more
openaire +1 more source

