Results 41 to 50 of about 2,429,355 (361)
Shared and Searchable Encrypted Data for Untrusted Servers [PDF]
Current security mechanisms pose a risk for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu+2 more
core +3 more sources
Leakage Inversion: Towards Quantifying Privacy in Searchable Encryption
Searchable encryption (SE) provides cryptographic guarantees that a user can efficiently search over encrypted data while only disclosing patterns about the data, also known as leakage.
Evgenios M. Kornaropoulos+3 more
semanticscholar +1 more source
Research on Logistics Information Blockchain Data Query Algorithm Based on Searchable Encryption
In order to ensure the security of logistics information and to query information quickly and efficiently, using searchable encryption algorithms, combined with the characteristics of the blockchain, a searchable and encrypted logistics information ...
Yibo Sun, Xiaofang Li, Furu Lv, Bing Hu
doaj +1 more source
ROSE: Robust Searchable Encryption With Forward and Backward Security
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a promising technique to delegate update and search queries over an outsourced database to an untrusted server while guaranteeing the privacy of data.
Peng Xu+6 more
semanticscholar +1 more source
Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage
In cloud storage, selectively sharing encrypted data is becoming increasingly important. One key design challenge is the management of encryption keys.
Yanqing Yao+3 more
doaj +1 more source
Public-Key Encryption with Delegated Search [PDF]
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter+3 more
core +3 more sources
Shared and searchable encrypted data for untrusted servers [PDF]
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu+2 more
core +1 more source
Parallel Key-Insulated Multiuser Searchable Encryption for Industrial Internet of Things
With the rapid development of the industrial Internet of Things (IIoT) and cloud computing, an increasing number of companies outsource their data to cloud servers to save costs. To protect data privacy, sensitive industrial data must be encrypted before
Jie Cui+5 more
semanticscholar +1 more source
HardIDX: Practical and Secure Index with SGX [PDF]
Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that
A Boldyreva+13 more
core +2 more sources
In the current E-healthcare scenarios, medical institutions are used to encrypt the information and store it in an Electronic Health Record (EHR) system in order to ensure the privacy of medical information.
Gang Xu+6 more
semanticscholar +1 more source