Results 41 to 50 of about 8,870 (281)

Longitude : a privacy-preserving location sharing protocol for mobile applications [PDF]

open access: yes, 2011
Location sharing services are becoming increasingly popular. Although many location sharing services allow users to set up privacy policies to control who can access their location, the use made by service providers remains a source of concern.
A. Beresford   +14 more
core   +3 more sources

R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]

open access: yes, 2019
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
Asif, W.   +4 more
core   +3 more sources

Towards Blockchain-Enabled Searchable Encryption [PDF]

open access: yes, 2020
Distributed Leger Technologies (DLTs), most notably Blockchain technologies, bring decentralised platforms that eliminate a single trusted third party and avoid the notorious single point of failure vulnerability. Since Nakamoto's Bitcoin cryptocurrency system, an enormous number of decentralised applications have been proposed on top of these ...
openaire   +2 more sources

Password-authenticated searchable encryption [PDF]

open access: yesInternational Journal of Information Security, 2020
AbstractWe introducePassword Authenticated Searchable Encryption (PASE), a novel searchable encryption scheme where a single human-memorizable password can be used to outsource (encrypted) data with associated keywords to a group of servers and later retrieve this data through the encrypted keyword search procedure.
Liqun Chen   +3 more
openaire   +1 more source

Efficient certificateless searchable encryption scheme with verifiability

open access: yesTongxin xuebao, 2023
Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from ...
Xinhua CUI, Youliang TIAN, Qijia ZHANG
doaj   +2 more sources

Forward-secure hierarchical predicate encryption [PDF]

open access: yes, 2012
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan   +2 more
core   +2 more sources

Blockchain-based result-traceable searchable encryption scheme

open access: yesDianxin kexue, 2019
In a searchable encryption scheme,whether it is a cloud server or a user,it may be deceptive.In order to solve the security problem,the definition of fairness security was given and a new searchable encryption scheme based on blockchain was proposed ...
Xinyao WENG, Lin YOU, Tingting LAN
doaj   +2 more sources

An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
In the cloud, users prefer to store their sensitive data in encrypted form. Searching keywords over encrypted data without loss of data confidentiality is an important issue. In 2004, Boneh et al.
Junling Guo   +4 more
doaj   +1 more source

A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data

open access: yes, 2018
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud ...
Li, Jiangnan   +2 more
core   +1 more source

Shared and Searchable Encrypted Data for Untrusted Servers [PDF]

open access: yes, 2008
Current security mechanisms pose a risk for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy