Results 41 to 50 of about 2,429,355 (361)

Shared and Searchable Encrypted Data for Untrusted Servers [PDF]

open access: yes, 2008
Current security mechanisms pose a risk for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu   +2 more
core   +3 more sources

Leakage Inversion: Towards Quantifying Privacy in Searchable Encryption

open access: yesConference on Computer and Communications Security, 2022
Searchable encryption (SE) provides cryptographic guarantees that a user can efficiently search over encrypted data while only disclosing patterns about the data, also known as leakage.
Evgenios M. Kornaropoulos   +3 more
semanticscholar   +1 more source

Research on Logistics Information Blockchain Data Query Algorithm Based on Searchable Encryption

open access: yesIEEE Access, 2021
In order to ensure the security of logistics information and to query information quickly and efficiently, using searchable encryption algorithms, combined with the characteristics of the blockchain, a searchable and encrypted logistics information ...
Yibo Sun, Xiaofang Li, Furu Lv, Bing Hu
doaj   +1 more source

ROSE: Robust Searchable Encryption With Forward and Backward Security

open access: yesIEEE Transactions on Information Forensics and Security, 2022
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a promising technique to delegate update and search queries over an outsourced database to an untrusted server while guaranteeing the privacy of data.
Peng Xu   +6 more
semanticscholar   +1 more source

Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage

open access: yesIEEE Access, 2019
In cloud storage, selectively sharing encrypted data is becoming increasingly important. One key design challenge is the management of encryption keys.
Yanqing Yao   +3 more
doaj   +1 more source

Public-Key Encryption with Delegated Search [PDF]

open access: yes, 2011
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter   +3 more
core   +3 more sources

Shared and searchable encrypted data for untrusted servers [PDF]

open access: yes, 2011
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu   +2 more
core   +1 more source

Parallel Key-Insulated Multiuser Searchable Encryption for Industrial Internet of Things

open access: yesIEEE Transactions on Industrial Informatics, 2022
With the rapid development of the industrial Internet of Things (IIoT) and cloud computing, an increasing number of companies outsource their data to cloud servers to save costs. To protect data privacy, sensitive industrial data must be encrypted before
Jie Cui   +5 more
semanticscholar   +1 more source

HardIDX: Practical and Secure Index with SGX [PDF]

open access: yes, 2017
Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that
A Boldyreva   +13 more
core   +2 more sources

PPSEB: A Postquantum Public-Key Searchable Encryption Scheme on Blockchain for E-Healthcare Scenarios

open access: yesSecurity and Communication Networks, 2022
In the current E-healthcare scenarios, medical institutions are used to encrypt the information and store it in an Electronic Health Record (EHR) system in order to ensure the privacy of medical information.
Gang Xu   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy