Results 21 to 30 of about 2,429,355 (361)

A study on searchable encryption schemes

open access: bronzeInternational Journal of Engineering & Technology, 2018
To manage large volume of data, most of the organizations and data owners outsource their data to remote cloud storage servers. Since the remote servers are untrusted party, the data has to be encrypted to achieve security and privacy. But encryption and decryption causes communication overhead for many data utilization operations like searching and ...
Sunitha Buchade, Prakash R. Devale
openaire   +4 more sources

A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents [PDF]

open access: yesUSENIX Security Symposium, 2023
Cloud data storage solutions offer customers cost-effective and reduced data management. While attractive, data security issues remain to be a core concern.
Marc Damie, Florian Hahn, Andreas Peter
semanticscholar   +1 more source

Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption

open access: yesIACR Cryptology ePrint Archive, 2023
We study encrypted storage schemes where a client outsources data to an untrusted third-party server (such as a cloud storage provider) while maintaining the ability to privately query and dynamically update the data.
Ghous Amjad   +4 more
semanticscholar   +1 more source

Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

open access: yesJournal of Cloud Computing, 2023
With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to achieve the above goal.
Liang Yan   +5 more
semanticscholar   +1 more source

An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time

open access: yesIEEE Access, 2021
Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography.
Lidong Han   +4 more
doaj   +1 more source

Privacy Preserving and Serverless Homomorphic-Based Searchable Encryption as a Service (SEaaS)

open access: yesIEEE Access, 2023
Serverless computing has seen rapid growth, thanks to its adaptability, elasticity, and deployment agility, embraced by both cloud providers and users. However, this surge in serverless adoption has prompted a reevaluation of security concerns and thus ...
Musfirah Ihtesham   +6 more
doaj   +1 more source

Research on the searchable encryption

open access: yes网络与信息安全学报, 2016
Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and ...
Peng XU, Hai JIN
doaj   +3 more sources

Registered Keyword Searchable Encryption Based on SM9

open access: yesApplied Sciences, 2023
The SM9 algorithm is an Identity-Based Encryption (IBE) algorithm independently made by China. The existing SM9 searchable encryption scheme cannot be effective against insider keyword guessing attacks and violates users’ data privacy.
Haoyu Zhang, Baodong Qin, Dong Zheng
doaj   +1 more source

A Searchable Encryption with Forward/Backward Security and Constant Storage

open access: yesApplied Sciences, 2023
Dynamic searchable encryption satisfies users’ needs for ciphertext retrieval on semi-trusted servers, while allowing users to update server-side data.
Suzhen Cao   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy