Results 331 to 340 of about 2,429,355 (361)
Some of the next articles are maybe not open access.

Lightweight Verification for Searchable Encryption

2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018
Symmetric Searchable Encryption (SSE) is a promising primitive to securely perform keyword queries and to efficiently retrieve associated files from a curious server without sacrificing data privacy. Unfortunately, besides being curious, an untrusted server could also be malicious, which would return incorrect or incomplete results to a client. Since a
Boyang Wang, Xinxin Fan
openaire   +1 more source

Error-Tolerant Searchable Encryption

2009 IEEE International Conference on Communications, 2009
In this paper, we describe a new primitive for Error-Tolerant Searchable Encryption and a security model for it. This generic scheme permits to make searches on encrypted data with only an approximation of some keyword. It enables to efficiently query secure databases in order to get the exact data with a close estimation of it.
Bruno Kindarji   +2 more
openaire   +2 more sources

Computationally Efficient Searchable Symmetric Encryption

2010
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little information as possible to the server. In the symmetric searchable encryption domain, the storage and the retrieval are performed by the same client.
Pieter H. Hartel   +4 more
openaire   +4 more sources

CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data

IEEE Transactions on Services Computing, 2023
Traditional searchable symmetric encryption (SSE) schemes rarely support context-aware semantic extension, and then lead to the searched results being incomplete or deviating from the user’s query intention.
Lanxiang Chen   +5 more
semanticscholar   +1 more source

Searchable Encryption for Biometric Identification Revisited

2016
Cryptographic primitives for searching and computing over encrypted data have proven useful in many applications. In this paper, we revisit the application of symmetric searchable encryption (SSE) to biometric identification. Our main contribution is two SSE schemes well-suited to be applied to biometric identification over encrypted data.
Amchyaa, Ghassane   +2 more
openaire   +2 more sources

Witness-based searchable encryption

Information Sciences, 2018
Abstract We put forward a new cryptographic primitive called witness-based searchable encryption (WBSE), namely if w and x satisfy a witness relation, an encryption of (m, w) could be tested by a trapdoor of (m′, x) whether the keyword m′ is equal to m.
Sha Ma, Yi Mu, Willy Susilo, Bo Yang
openaire   +2 more sources

Boolean symmetric searchable encryption

Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013
In this article we tackle the issue of searchable encryption with a generalized query model. Departing from many previous works that focused on queries consisting of a single keyword, we consider the the case of queries consisting of arbitrary boolean expressions on keywords, that is to say conjunctions and disjunctions of keywords and their complement.
Abdullatif Shikfa, Tarik Moataz
openaire   +2 more sources

Cloud Architectures for Searchable Encryption [PDF]

open access: possibleProceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Blomer et al. have presented a cloud architecture for enabling fine-grained cryptographic access control to data in the cloud. The architecture is intended to provide this service to large-scale orgnaizations. We revisit the cloud architecture, and enrich it with searchable encryption.
Nils Löken, Johannes Blömer
openaire   +1 more source

Searchable Encryption for Outsourced Data Analytics

2011
Two sets of privacy requirements need to be fulfilled when a company's accounting data is audited by an external party: the company needs to safeguard its data, while the auditors do not want to reveal their investigation methods. This problem is usually addressed by physically isolating data and auditors during the course of an audit.
Kerschbaum F., Sorniotti A.
openaire   +2 more sources

The Study of Searchable Encryption Mechanism

2018
With the development of information technology, more and more data information uploaded to the cloud server, cloud computing encryption storage technology for data security has become particularly important. This paper mainly studies and analyzes the searchable encryption technology in cloud computing.
Yongsheng Zhang, Ranran Cui, Nengneng Li
openaire   +2 more sources

Home - About - Disclaimer - Privacy