Results 261 to 270 of about 2,775,007 (306)
Some of the next articles are maybe not open access.

Understanding Leakage in Searchable Encryption: a Quantitative Approach

Proceedings on Privacy Enhancing Technologies
Searchable encryption, or more generally, structured encryption, permits search over encrypted data. It is an important cryptographic tool for securing cloud storage.
A. Boldyreva, Zichen Gui, B. Warinschi
semanticscholar   +1 more source

A Secure and Efficient Charitable Donation System Based on Ethereum Blockchain and Searchable Encryption

IEEE transactions on consumer electronics
With the flourishing development of philanthropy, more and more people are actively involved in charitable activities. However, traditional charitable systems face several challenges, including low levels of information, lack of transparency in the flow ...
Buzhen He   +4 more
semanticscholar   +1 more source

Dynamic searchable symmetric encryption

Proceedings of the 2012 ACM conference on Computer and communications security, 2012
Searchable symmetric encryption (SSE) allows a client to encrypt its data in such a way that this data can still be searched. The most immediate application of SSE is to cloud storage, where it enables a client to securely outsource its data to an untrusted cloud provider without sacrificing the ability to search over it.SSE has been the focus of ...
Seny Kamara   +2 more
openaire   +1 more source

Boolean symmetric searchable encryption

Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013
In this article we tackle the issue of searchable encryption with a generalized query model. Departing from many previous works that focused on queries consisting of a single keyword, we consider the the case of queries consisting of arbitrary boolean expressions on keywords, that is to say conjunctions and disjunctions of keywords and their complement.
Tarik Moataz, Abdullatif Shikfa
openaire   +1 more source

Unconditionally secure searchable encryption

2017 51st Annual Conference on Information Sciences and Systems (CISS), 2017
Searchable symmetric encryption (SSE) enables us to search encrypted data with an arbitrarily chosen keyword without leaking information on the data and keyword. SSE is expected to be used in, for example, cloud computing and genome analyses. In particular, privacy of genome data must be guaranteed for long periods, and therefore unconditionally secure
Takahiro Yoshizawa   +2 more
openaire   +1 more source

Broadcast Searchable Keyword Encryption

2014 IEEE 17th International Conference on Computational Science and Engineering, 2014
Broadcast Searchable Keywords Encryption (BSKE) is a novel scheme that allows searching in encrypted data without knowing a secret key. Consider Bob wants to encrypt the same data under master public key for a group of users and stores this encrypted data with Alice, Malice is one of those recipients he asks Alice using his private key whether or not ...
Mohamed Ali   +5 more
openaire   +1 more source

Searchable Encryption

2023
Kui Ren, Cong Wang
openaire   +1 more source

Lightweight Searchable and Equality-Testable Certificateless Authenticated Encryption for Encrypted Cloud Data

IEEE Transactions on Mobile Computing
Public key encryption with equality test (PKE-ET) is a novel cryptosystem to deal with the problem of multi-public-key encrypted data computing. It can be used to verify if different ciphertexts are encryptions of same plaintext under different public ...
Jinmei Tian, Yang Lu, Jiguo Li
semanticscholar   +1 more source

Searchable Encryption for Outsourced Data Analytics

2011
Two sets of privacy requirements need to be fulfilled when a company's accounting data is audited by an external party: the company needs to safeguard its data, while the auditors do not want to reveal their investigation methods. This problem is usually addressed by physically isolating data and auditors during the course of an audit.
Kerschbaum F., Sorniotti A.
openaire   +1 more source

Asymmetric Searchable Encryption from Inner Product Encryption

2016
Asymmetric searchable encryption(ASE) enables one to retrieve encrypted data stored on an untrusted server without revealing the contents. Now, beyond single keyword search, more and more attention have already been paid to the problem of multi-keyword search. However, existing schemes are mainly based on composite-order bilinear groups. In this paper,
Siyu Xiao   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy