Results 341 to 350 of about 2,429,355 (361)
Some of the next articles are maybe not open access.

Broadcast Searchable Keyword Encryption

2014 IEEE 17th International Conference on Computational Science and Engineering, 2014
Broadcast Searchable Keywords Encryption (BSKE) is a novel scheme that allows searching in encrypted data without knowing a secret key. Consider Bob wants to encrypt the same data under master public key for a group of users and stores this encrypted data with Alice, Malice is one of those recipients he asks Alice using his private key whether or not ...
Ting Zhong   +5 more
openaire   +2 more sources

Dynamic searchable symmetric encryption

Proceedings of the 2012 ACM conference on Computer and communications security, 2012
Searchable symmetric encryption (SSE) allows a client to encrypt its data in such a way that this data can still be searched. The most immediate application of SSE is to cloud storage, where it enables a client to securely outsource its data to an untrusted cloud provider without sacrificing the ability to search over it.SSE has been the focus of ...
Tom Roeder   +2 more
openaire   +2 more sources

Symmetric Searchable Encryption with Sharing and Unsharing

2018
In this paper, we study Symmetric Searchable Encryption (SSE) in a multi-user setting in which each user dynamically shares its documents with selected other users, allowing sharees also to perform searches. We introduce the concept of a Symmetric Searchable Encryption with Sharing and Unsharing, an extension of Multi-Key Searchable Encryption (NSDI ...
Sarvar Patel   +3 more
openaire   +3 more sources

Hardware Acceleration of Searchable Encryption

Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Searchable symmetric encryption (SSE) allows a client to outsource the storage of her data to an (untrusted) server in a private manner, while maintaining the ability to selectively search over it. A key feature of all existing SSE schemes is the tradeoff between security (in terms of the information leakage to the server) and efficiency (in terms of ...
Sikhar Patranabis   +3 more
openaire   +1 more source

Multi-user Searchable Encryption in the Cloud

2015
While Searchable Encryption (SE) has been widely studied, adapting it to the multi-user setting whereby many users can upload secret files or documents and delegate search operations to multiple other users still remains an interesting problem. In this paper we show that the adversarial models used in existing multi-user searchable encryption solutions
van Rompay, Cédric   +2 more
openaire   +3 more sources

Unconditionally secure searchable encryption

2017 51st Annual Conference on Information Sciences and Systems (CISS), 2017
Searchable symmetric encryption (SSE) enables us to search encrypted data with an arbitrarily chosen keyword without leaking information on the data and keyword. SSE is expected to be used in, for example, cloud computing and genome analyses. In particular, privacy of genome data must be guaranteed for long periods, and therefore unconditionally secure
Takahiro Yoshizawa   +2 more
openaire   +2 more sources

Deniable Searchable Symmetric Encryption

Information Sciences, 2017
In the recent years, Searchable Symmetric Encryption (SSE) has become one of the hottest topic in cloud-computing area because of its availability and flexibility, and there are a series of SSE schemes were proposed. The adversary considered in these schemes is either honest-but-curious or malicious.
Huige Li, Chun-I Fan, Fangguo Zhang
openaire   +2 more sources

Searchable Encryption in Apache Cassandra

2016
In today’s cloud computing applications it is common practice for clients to outsource their data to cloud storage providers. That data may contain sensitive information, which the client wishes to protect against this untrustworthy environment. Confidentiality can be preserved by the use of encryption.
Ramaninder Singh Jhajj   +2 more
openaire   +2 more sources

Efficient Medical Big Data Management With Keyword-Searchable Encryption in Healthchain

IEEE Systems Journal, 2022
Chaoyang Li   +6 more
semanticscholar   +1 more source

Searchable Encryption

2020
Marius Iulian Mihailescu   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy