Results 31 to 40 of about 8,870 (281)

Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications

open access: yesIEEE Access, 2020
Recently, the rapid development of Internet of things (IoT) has resulted in the generation of a considerable amount of data, which should be stored. Therefore, it is necessary to develop methods that can easily capture, save, and modify these data.
Yen-Wu Ti   +3 more
doaj   +1 more source

Verifiable dynamic searchable encryption

open access: yesTURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES, 2019
Using regular encryption schemes to protect the privacy of the outsourced data implies that the client should sacrifice functionality for security. Searchable symmetric encryption (SSE) schemes encrypt the data in a way that the client can later search and selectively retrieve the required data. Many SSE schemes have been proposed, starting with static
Mohammad ETEMAD, Alptekin KÜPÇÜ
openaire   +4 more sources

Rethinking Searchable Symmetric Encryption

open access: yes2023 IEEE Symposium on Security and Privacy (SP), 2023
ISBN:978-1-6654-9336 ...
Gui, Zichen   +2 more
openaire   +2 more sources

Public-Key Encryption with Delegated Search [PDF]

open access: yes, 2011
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter   +3 more
core   +3 more sources

Searchable Symmetric Encryption

open access: yes, 2023
AbstractSearchable symmetric encryption allows operating on encrypted data, particularly keyword-based search on documents and range-based search on spatial data. Various methods can be used in Searchable symmetric encryption, such as order-preserving or fully homomorphic encryption, for different levels of information leakage.
Cyrill Krähenbühl, Adrian Perrig
openaire   +1 more source

Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [PDF]

open access: yesJisuanji kexue, 2022
Searchable encryption technology can realize keyword search without decrypting the data,and thus well protects user'sprivate information.Aiming at the problem that most current searchable encryption schemes cannot support user-defined search strategies ...
GAO Shi-yao, CHEN Yan-li, XU Yu-lan
doaj   +1 more source

Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage

open access: yesIEEE Access, 2019
In cloud storage, selectively sharing encrypted data is becoming increasingly important. One key design challenge is the management of encryption keys.
Yanqing Yao   +3 more
doaj   +1 more source

A practical and secure multi-keyword search method over encrypted cloud data [PDF]

open access: yes, 2013
Cloud computing technologies become more and more popular every year, as many organizations tend to outsource their data utilizing robust and fast services of clouds while lowering the cost of hardware ownership.
Kantarcioglu, Murat   +5 more
core   +1 more source

Research on Logistics Information Blockchain Data Query Algorithm Based on Searchable Encryption

open access: yesIEEE Access, 2021
In order to ensure the security of logistics information and to query information quickly and efficiently, using searchable encryption algorithms, combined with the characteristics of the blockchain, a searchable and encrypted logistics information ...
Yibo Sun, Xiaofang Li, Furu Lv, Bing Hu
doaj   +1 more source

Encrypted Shared Data Spaces [PDF]

open access: yes, 2008
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content.
A. Wood   +13 more
core   +2 more sources

Home - About - Disclaimer - Privacy