Results 21 to 30 of about 3,121 (282)

Overview of searchable encryption research

open access: yes网络与信息安全学报, 2018
With the development of cloud computing,there is an increasing number of companies and individuals outsourcing their data to cloud server in the encrypted form to protect data security and user privacy.As a result,efficient retrieval of encrypted data ...
Ying LI, Chunguang MA
doaj   +3 more sources

Dynamic multi-keyword searchable encryption scheme

open access: yes网络与信息安全学报, 2023
Users of cloud storage often outsource their data to cloud servers to save local storage resources.However, cloud storage data is out of the user’s physical control, which may lead to malicious theft or disclosure of private data on cloud.At present ...
Chenghao YUAN, Yong LI, Shuang REN
doaj   +3 more sources

Substring-Searchable Symmetric Encryption [PDF]

open access: yesProceedings on Privacy Enhancing Technologies, 2015
Abstract In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s.
Melissa Chase, Emily Shen
openaire   +1 more source

Searchable Symmetric Encryption

open access: yes, 2023
AbstractSearchable symmetric encryption allows operating on encrypted data, particularly keyword-based search on documents and range-based search on spatial data. Various methods can be used in Searchable symmetric encryption, such as order-preserving or fully homomorphic encryption, for different levels of information leakage.
Cyrill Krähenbühl, Adrian Perrig
openaire   +1 more source

Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing

open access: yesInformation, 2018
With the advent of cloud computing, more and more users begin to outsource encrypted files to cloud servers to provide convenient access and obtain security guarantees.
Chen Guo   +5 more
doaj   +1 more source

Dynamic Local Searchable Symmetric Encryption

open access: yes, 2022
In this article, we tackle for the first time the problem of dynamic memory-efficient Searchable Symmetric Encryption (SSE). In the term "memory-efficient" SSE, we encompass both the goals of local SSE, and page-efficient SSE. The centerpiece of our approach is a novel connection between those two goals.
Minaud, Brice, Reichle, Michael
openaire   +3 more sources

Public-Key Encryption with Delegated Search [PDF]

open access: yes, 2011
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter   +3 more
core   +3 more sources

Efficient dynamic searchable encryption scheme for conjunctive queries based on bidirectional index

open access: yesTongxin xuebao, 2022
To solve the problems of complicated operation, information leakage, and inflexible query method in the update process of existing dynamic searchable encryption scheme, an efficient dynamic searchable encryption scheme (named BPC-DSSE) for conjunctive ...
Ruizhong DU, Yuqing ZHANG, Mingyue LI
doaj   +2 more sources

A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods

open access: yesThe Scientific World Journal, 2014
Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud.
Guangchun Luo   +3 more
doaj   +1 more source

A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments

open access: yesCryptography, 2022
Cloud computing offers the possibility of providing suitable access within a network for a set of resources. Many users use different services for outsourcing their data within the cloud, saving and mitigating the local storage and other resources ...
Marius Iulian Mihailescu   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy