Results 61 to 70 of about 2,429,355 (361)

Tight Tradeoffs in Searchable Symmetric Encryption

open access: yesJournal of Cryptology, 2018
A searchable symmetric encryption (SSE) scheme enables a client to store data on an untrusted server while supporting keyword searches in a secure manner. Recent experiments have indicated that the practical relevance of such schemes heavily relies on the tradeoff between their space overhead, locality (the number of non-contiguous memory locations ...
Asharov, Gilad, Segev, Gil, Shahaf, Ido
openaire   +2 more sources

Overview of searchable encryption research

open access: yes网络与信息安全学报, 2018
With the development of cloud computing,there is an increasing number of companies and individuals outsourcing their data to cloud server in the encrypted form to protect data security and user privacy.As a result,efficient retrieval of encrypted data ...
Ying LI,Chunguang MA
doaj   +3 more sources

A keyword searchable attribute-based encryption scheme with attribute update for cloud storage. [PDF]

open access: yesPLoS ONE, 2018
Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primitive, which is very suitable for data cloud storage for its fine-grained access control.
Shangping Wang, Jian Ye, Yaling Zhang
doaj   +1 more source

Research on asymmetric searchable encryption [PDF]

open access: yesAIP Conference Proceedings, 2017
Cloud server side to ease the user’s local storage pressure at the same time, there are hidden data on the hidden dangers, the user often choose to upload the data in the form of cipher text to the cloud server. However, the classic data encryption and decryption algorithms are not provided search function, affecting the user’s efficiency. To this end,
Yudong Wu, Zonghua Yu
openaire   +2 more sources

Blockchain-based result-traceable searchable encryption scheme

open access: yesDianxin kexue, 2019
In a searchable encryption scheme,whether it is a cloud server or a user,it may be deceptive.In order to solve the security problem,the definition of fairness security was given and a new searchable encryption scheme based on blockchain was proposed ...
Xinyao WENG, Lin YOU, Tingting LAN
doaj   +2 more sources

POPE: Partial Order Preserving Encoding [PDF]

open access: yes, 2016
Recently there has been much interest in performing search queries over encrypted data to enable functionality while protecting sensitive data. One particularly efficient mechanism for executing such queries is order-preserving encryption/encoding (OPE ...
Apon, Daniel   +3 more
core   +2 more sources

Towards Blockchain-Enabled Searchable Encryption [PDF]

open access: yes, 2020
Distributed Leger Technologies (DLTs), most notably Blockchain technologies, bring decentralised platforms that eliminate a single trusted third party and avoid the notorious single point of failure vulnerability. Since Nakamoto's Bitcoin cryptocurrency system, an enormous number of decentralised applications have been proposed on top of these ...
openaire   +3 more sources

SWiSSSE: System-Wide Security for Searchable Symmetric Encryption

open access: yesIACR Cryptology ePrint Archive
This paper initiates a new direction in the design and analysis of searchable symmetric encryption (SSE) schemes. We provide the first comprehensive security model and definition for SSE that takes into account leakage from the entirety of the SSE system,
Zichen Gui   +3 more
semanticscholar   +1 more source

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption [PDF]

open access: yesJournal of Universal Computer Science, 2019
Searchable encryption enables the data owner to outsource their data to the cloud server while retaining the search ability. Recently, some researchers proposed a variant of searchable encryption, named single-writer/multi-reader searchable encryption ...
Yunling Wang   +7 more
doaj   +3 more sources

Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, Vol. 10, no. 9, pp. 1993-2006, 2015, 2015
Existing semantically secure public-key searchable encryption schemes take search time linear with the total number of the ciphertexts. This makes retrieval from large-scale databases prohibitive. To alleviate this problem, this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible ...
arxiv   +1 more source

Home - About - Disclaimer - Privacy