Results 31 to 40 of about 10,983 (307)
A practical and secure multi-keyword search method over encrypted cloud data [PDF]
Cloud computing technologies become more and more popular every year, as many organizations tend to outsource their data utilizing robust and fast services of clouds while lowering the cost of hardware ownership.
Kantarcioglu, Murat +5 more
core +1 more source
Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [PDF]
Searchable encryption technology can realize keyword search without decrypting the data,and thus well protects user'sprivate information.Aiming at the problem that most current searchable encryption schemes cannot support user-defined search strategies ...
GAO Shi-yao, CHEN Yan-li, XU Yu-lan
doaj +1 more source
POPE: Partial Order Preserving Encoding [PDF]
Recently there has been much interest in performing search queries over encrypted data to enable functionality while protecting sensitive data. One particularly efficient mechanism for executing such queries is order-preserving encryption/encoding (OPE ...
Apon, Daniel +3 more
core +2 more sources
Shared and Searchable Encrypted Data for Untrusted Servers [PDF]
Current security mechanisms pose a risk for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu +2 more
core +3 more sources
Shared and searchable encrypted data for untrusted servers [PDF]
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu +2 more
core +1 more source
Research on Logistics Information Blockchain Data Query Algorithm Based on Searchable Encryption
In order to ensure the security of logistics information and to query information quickly and efficiently, using searchable encryption algorithms, combined with the characteristics of the blockchain, a searchable and encrypted logistics information ...
Yibo Sun, Xiaofang Li, Furu Lv, Bing Hu
doaj +1 more source
Password-authenticated searchable encryption [PDF]
AbstractWe introducePassword Authenticated Searchable Encryption (PASE), a novel searchable encryption scheme where a single human-memorizable password can be used to outsource (encrypted) data with associated keywords to a group of servers and later retrieve this data through the encrypted keyword search procedure.
Liqun Chen +3 more
openaire +1 more source
Efficient certificateless searchable encryption scheme with verifiability
Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from ...
Xinhua CUI, Youliang TIAN, Qijia ZHANG
doaj +2 more sources
SoK: Cryptographically Protected Database Search [PDF]
Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches.
Cunningham, Robert K. +8 more
core +1 more source
Blockchain-based result-traceable searchable encryption scheme
In a searchable encryption scheme,whether it is a cloud server or a user,it may be deceptive.In order to solve the security problem,the definition of fairness security was given and a new searchable encryption scheme based on blockchain was proposed ...
Xinyao WENG, Lin YOU, Tingting LAN
doaj +2 more sources

