Results 31 to 40 of about 10,983 (307)

A practical and secure multi-keyword search method over encrypted cloud data [PDF]

open access: yes, 2013
Cloud computing technologies become more and more popular every year, as many organizations tend to outsource their data utilizing robust and fast services of clouds while lowering the cost of hardware ownership.
Kantarcioglu, Murat   +5 more
core   +1 more source

Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [PDF]

open access: yesJisuanji kexue, 2022
Searchable encryption technology can realize keyword search without decrypting the data,and thus well protects user'sprivate information.Aiming at the problem that most current searchable encryption schemes cannot support user-defined search strategies ...
GAO Shi-yao, CHEN Yan-li, XU Yu-lan
doaj   +1 more source

POPE: Partial Order Preserving Encoding [PDF]

open access: yes, 2016
Recently there has been much interest in performing search queries over encrypted data to enable functionality while protecting sensitive data. One particularly efficient mechanism for executing such queries is order-preserving encryption/encoding (OPE ...
Apon, Daniel   +3 more
core   +2 more sources

Shared and Searchable Encrypted Data for Untrusted Servers [PDF]

open access: yes, 2008
Current security mechanisms pose a risk for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu   +2 more
core   +3 more sources

Shared and searchable encrypted data for untrusted servers [PDF]

open access: yes, 2011
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu   +2 more
core   +1 more source

Research on Logistics Information Blockchain Data Query Algorithm Based on Searchable Encryption

open access: yesIEEE Access, 2021
In order to ensure the security of logistics information and to query information quickly and efficiently, using searchable encryption algorithms, combined with the characteristics of the blockchain, a searchable and encrypted logistics information ...
Yibo Sun, Xiaofang Li, Furu Lv, Bing Hu
doaj   +1 more source

Password-authenticated searchable encryption [PDF]

open access: yesInternational Journal of Information Security, 2020
AbstractWe introducePassword Authenticated Searchable Encryption (PASE), a novel searchable encryption scheme where a single human-memorizable password can be used to outsource (encrypted) data with associated keywords to a group of servers and later retrieve this data through the encrypted keyword search procedure.
Liqun Chen   +3 more
openaire   +1 more source

Efficient certificateless searchable encryption scheme with verifiability

open access: yesTongxin xuebao, 2023
Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from ...
Xinhua CUI, Youliang TIAN, Qijia ZHANG
doaj   +2 more sources

SoK: Cryptographically Protected Database Search [PDF]

open access: yes, 2017
Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches.
Cunningham, Robert K.   +8 more
core   +1 more source

Blockchain-based result-traceable searchable encryption scheme

open access: yesDianxin kexue, 2019
In a searchable encryption scheme,whether it is a cloud server or a user,it may be deceptive.In order to solve the security problem,the definition of fairness security was given and a new searchable encryption scheme based on blockchain was proposed ...
Xinyao WENG, Lin YOU, Tingting LAN
doaj   +2 more sources

Home - About - Disclaimer - Privacy