Results 281 to 290 of about 48,518 (327)

Deniable Searchable Symmetric Encryption

Information Sciences, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Fangguo Zhang, Chun-I Fan
exaly   +3 more sources

Dynamic searchable symmetric encryption

Proceedings of the 2012 ACM conference on Computer and communications security, 2012
Searchable symmetric encryption (SSE) allows a client to encrypt its data in such a way that this data can still be searched. The most immediate application of SSE is to cloud storage, where it enables a client to securely outsource its data to an untrusted cloud provider without sacrificing the ability to search over it.SSE has been the focus of ...
Seny Kamara   +2 more
openaire   +2 more sources

Randomized symmetric block encryption

Proceedings of the First International Conference on Security of Internet of Things, 2012
Most of the trivial symmetric block encryption algorithms give the same cipher text for a given set of plain text and key. This property can be used for performing linear and differential cryptanalysis. Using the concept of random data generation we designed a new scheme to give different cipher texts for a given set of plain text and key (when ...
B. Dinesh Reddy   +2 more
openaire   +1 more source

Searchable Symmetric Encryption

ACM Computing Surveys, 2017
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data without the risk of data leakage. Despite the widespread interest, existing surveys do not examine in detail how SSE’s underlying structures are designed and how these result in the many properties of a SSE scheme.
Geong Sen Poh   +4 more
openaire   +2 more sources

Boolean symmetric searchable encryption

Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013
In this article we tackle the issue of searchable encryption with a generalized query model. Departing from many previous works that focused on queries consisting of a single keyword, we consider the the case of queries consisting of arbitrary boolean expressions on keywords, that is to say conjunctions and disjunctions of keywords and their complement.
Tarik Moataz, Abdullatif Shikfa
openaire   +2 more sources

Universally Composable Symmetric Encryption

2009 22nd IEEE Computer Security Foundations Symposium, 2009
For most basic cryptographic tasks, such as public-key encryption, digital signatures, authentication, key exchange, and many other more sophisticated tasks, ideal functionalities have been formulated in the simulation-based security approach, along with their realizations.
Ralf Küsters, Max Tuengerthal
openaire   +2 more sources

Symmetric encryption and XML encryption patterns

Proceedings of the 16th Conference on Pattern Languages of Programs, 2009
Most of the time information handled by organizations has been collected and processed by computers and transmitted across networks to other computers. How can we protect this information from unauthorized access when it is being transmitted? Encryption provides confidentiality by protecting sensitive information from being read by intruders.
Keiko Hashizume, Eduardo B. Fernandez
openaire   +1 more source

Amortized Threshold Symmetric-key Encryption

Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021
Threshold cryptography enables cryptographic operations while keeping the secret keys distributed at all times. Agrawal et al. (CCS'18) propose a framework for Distributed Symmetric-key Encryption (DiSE). They introduce a new notion of Threshold Symmetric-key Encryption (TSE), in that encryption and decryption are performed by interacting with a ...
Mihai Christodorescu   +3 more
openaire   +2 more sources

Symmetric Encryption

2012
Abstract This chapter concerns symmetric encryption and introduces core concepts and algorithms. It explains the difference between stream and block ciphers and demonstrates how their different properties result in different uses. Two important block ciphers are considered in some detail.
openaire   +1 more source

Home - About - Disclaimer - Privacy