Results 21 to 30 of about 10,983 (307)
Searchable encryption scheme based on attribute policy hiding in a cloud environment
Attribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker ...
Yihua ZHOU, Xinyu HU, Meiqi LI, Yuguang YANG
doaj +3 more sources
Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version) [PDF]
Searchable encryption is a technique that allows a client to store data in encrypted form on a curious server, such that data can be retrieved while leaking a minimal amount of information to the server.
Doumen, J.M. +3 more
core +11 more sources
Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices
To protect the privacy of cloud data, encryption before uploading provides a solution. However, searching for target data in ciphertext takes effort. Therefore, searchable encryption has become an important research topic.
Er-Shuo Zhuang, Chun-I Fan
doaj +1 more source
Partitioned Searchable Encryption
Symmetric searchable encryption (SSE) allows to outsource encrypted data to an untrusted server and retain searching capabilities. This is done without impacting the privacy of both the data and the search/update queries. In this work we put forth a new flavour of symmetric searchable encryption (SSE):Partitioned SSE is meant to capture the cases where
Barthel, Jim Jean-Pierre +3 more
openaire +2 more sources
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
Asif, W. +4 more
core +3 more sources
Public-Key Encryption with Delegated Search [PDF]
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter +3 more
core +3 more sources
Recently, the rapid development of Internet of things (IoT) has resulted in the generation of a considerable amount of data, which should be stored. Therefore, it is necessary to develop methods that can easily capture, save, and modify these data.
Yen-Wu Ti +3 more
doaj +1 more source
Verifiable dynamic searchable encryption
Using regular encryption schemes to protect the privacy of the outsourced data implies that the client should sacrifice functionality for security. Searchable symmetric encryption (SSE) schemes encrypt the data in a way that the client can later search and selectively retrieve the required data. Many SSE schemes have been proposed, starting with static
Mohammad ETEMAD, Alptekin KÜPÇÜ
openaire +4 more sources
Rethinking Searchable Symmetric Encryption
ISBN:978-1-6654-9336 ...
Gui, Zichen +2 more
openaire +2 more sources
Searchable Symmetric Encryption
AbstractSearchable symmetric encryption allows operating on encrypted data, particularly keyword-based search on documents and range-based search on spatial data. Various methods can be used in Searchable symmetric encryption, such as order-preserving or fully homomorphic encryption, for different levels of information leakage.
Cyrill Krähenbühl, Adrian Perrig
openaire +1 more source

