BPKEM: A biometric-based private key encryption and management framework for blockchain. [PDF]
Cai H, Li H, Xu J, Li L, Zhang Y.
europepmc +1 more source
Retrieval Integrity Verification and Multi-System Data Interoperability Mechanism of a Blockchain Oracle for Smart Healthcare with Internet of Things (IoT) Integration. [PDF]
Zhou Z +5 more
europepmc +1 more source
Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance. [PDF]
Sahu SK, Mazumdar K.
europepmc +1 more source
Related searches:
Deniable Searchable Symmetric Encryption
Information Sciences, 2017zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Huige, Zhang, Fangguo, Fan, Chun-I
openaire +4 more sources
Blockchain-based searchable symmetric encryption scheme
Computers & Electrical Engineering, 2019Abstract The mechanism for traditional searchable symmetric encryption (SSE) is pay-then-use. This situation is not fair to user because the cloud server may return wrong results. Besides, the user needs to verify these results locally. In order to ensure fairness and reduce user’s calculations, we combined blockchain with SSE, and proposed a fair ...
Huige Li +3 more
openaire +3 more sources
Searchable symmetric encryption: Improved definitions and efficient constructions [PDF]
Searchable symmetric encryption (SSE) allows a party to outsource the storage of his data to another party in a private manner, while maintaining the ability to selectively search over it. This problem has been the focus of active research and several security definitions and constructions have been proposed.
Reza Curtmola +3 more
openaire +1 more source
Updatable Searchable Symmetric Encryption: Definitions and Constructions
Theoretical Computer Science, 2023zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xiwen Wang +4 more
openaire +1 more source
Searchable Symmetric Encryption
ACM Computing Surveys, 2017Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data without the risk of data leakage. Despite the widespread interest, existing surveys do not examine in detail how SSE’s underlying structures are designed and how these result in the many properties of a SSE scheme.
Poh, Geong Sen +4 more
openaire +2 more sources
Dynamic searchable symmetric encryption
Proceedings of the 2012 ACM conference on Computer and communications security, 2012Searchable symmetric encryption (SSE) allows a client to encrypt its data in such a way that this data can still be searched. The most immediate application of SSE is to cloud storage, where it enables a client to securely outsource its data to an untrusted cloud provider without sacrificing the ability to search over it.SSE has been the focus of ...
Seny Kamara +2 more
openaire +1 more source
Boolean symmetric searchable encryption
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013In this article we tackle the issue of searchable encryption with a generalized query model. Departing from many previous works that focused on queries consisting of a single keyword, we consider the the case of queries consisting of arbitrary boolean expressions on keywords, that is to say conjunctions and disjunctions of keywords and their complement.
Tarik Moataz, Abdullatif Shikfa
openaire +1 more source

