Results 291 to 300 of about 48,518 (327)
Some of the next articles are maybe not open access.
2017
In this chapter, we focus on symmetric encryption. We begin by identifying two different types of symmetric encryption algorithm, namely, stream and block ciphers. We discuss the basic idea behind a stream cipher and consider their properties and applications. We then introduce block ciphers.
openaire +1 more source
In this chapter, we focus on symmetric encryption. We begin by identifying two different types of symmetric encryption algorithm, namely, stream and block ciphers. We discuss the basic idea behind a stream cipher and consider their properties and applications. We then introduce block ciphers.
openaire +1 more source
Garbled Searchable Symmetric Encryption
2014In a searchable symmetric encryption (SSE) scheme, a client can keyword search over symmetrically-encrypted files which he stored on the server (ideally without leaking any information to the server). In this paper, we show the first multiple keyword search SSE scheme such that even the search formula \(f\) (AND, OR and so on) is kept secret.
openaire +1 more source
Symmetric Searchable Encryption with Sharing and Unsharing
2018In this paper, we study Symmetric Searchable Encryption (SSE) in a multi-user setting in which each user dynamically shares its documents with selected other users, allowing sharees also to perform searches. We introduce the concept of a Symmetric Searchable Encryption with Sharing and Unsharing, an extension of Multi-Key Searchable Encryption (NSDI ...
Patel S., Persiano G., Yeo K.
openaire +3 more sources
On the soundness of authenticate-then-encrypt
Proceedings of the 17th ACM conference on Computer and communications security, 2010A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where the security properties of the channel are characterized by the capabilities provided at the E-interface.A security mechanism, such as encryption or a message authentication ...
Maurer Ueli, Tackmann Björn
openaire +1 more source
Symmetric-Key Homomorphic Encryption for Encrypted Data Processing
2009 IEEE International Conference on Communications, 2009The difficulty of processing data in encrypted form has long been the barrier to the widespread use of encryption in data storage applications; improved security or privacy would always imply a sacrifice of functionality. Many applications, such as ASP, requiring a significant amount of processing at the data storage servers are hence precluded from ...
openaire +1 more source
Undecryptable symmetric encryption
2011 IEEE GCC Conference and Exhibition (GCC), 2011Cryptography is necessary where the confidentiality of information needs to be protected, but it often not sufficient. There are many cases where a persistent attacker can obtain the secret keys in use on a system, no matter how much the system tries to prevent this (e.g. cold-boot attacks, DRM circumvention).
openaire +1 more source
Forward secure searchable symmetric encryption
2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 2017Data outsourcing to third party clouds poses numerous data security threats. Access by unauthorized users is one of the security threat to the outsourced data. Unauthorized access can be avoided by encrypting the data before outsourcing. However, encrypting data before outsourcing renders it unsearchable to the data owner. Searchable encryption schemes
Muhammad Saqib Niaz, Gunter Saake
openaire +1 more source
Computationally Efficient Searchable Symmetric Encryption
2010Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little information as possible to the server. In the symmetric searchable encryption domain, the storage and the retrieval are performed by the same client.
Peter van Liesdonk +4 more
openaire +3 more sources
Attribute-Based Symmetric Searchable Encryption
2020Symmetric Searchable Encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data while preserving the privacy of both the files and the queries. Unfortunately, majority of the SSE schemes allows users to either decrypt the whole ciphertext or nothing at all.
Hai-Van Dang +3 more
openaire +2 more sources
2002
Symmetric-key encryption schemes provide secure communication for a pair of communication partners. An adversary who intercepts a message should not get any significant information about its content. In this chapter, we give a short introduction to symmetric-key encryption. We explain the notions of stream and block ciphers.
Hans Delfs, Helmut Knebl
openaire +1 more source
Symmetric-key encryption schemes provide secure communication for a pair of communication partners. An adversary who intercepts a message should not get any significant information about its content. In this chapter, we give a short introduction to symmetric-key encryption. We explain the notions of stream and block ciphers.
Hans Delfs, Helmut Knebl
openaire +1 more source

