Results 171 to 180 of about 3,048 (208)
Some of the next articles are maybe not open access.

Toward Practical Searchable Symmetric Encryption

2013
Searchable symmetric encryption is a good building block toward ensuring privacy preserving keyword searches in a cloud computing environment. This area has recently attracted a great deal of attention and a large quantity of research has been conducted.
Wakaha Ogata   +3 more
openaire   +1 more source

Searchable symmetric encryption over multiple servers

Cryptography and Communications, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Geong Sen Poh   +2 more
openaire   +1 more source

Improved Indistinguishability for Searchable Symmetric Encryption

2020
This work presents a new experiment defining indistinguishability for searchable symmetric encryption to include security against published practical attacks. The proposed experiment allows the adversaries to use their prior knowledge about the stored documents to win.
Chin, Ji Jian, Mohamad, Moesfa Soeheila
openaire   +1 more source

UC-Secure Searchable Symmetric Encryption

2012
For searchable symmetric encryption schemes (or symmetric-key encryption with keyword search), the security against passive adversaries (i.e. privacy) has been mainly considered so far. In this paper, we first define its security against active adversaries (i.e. reliability as well as privacy). We next formulate its UC-security.
Kaoru Kurosawa, Yasuhiro Ohtaki
openaire   +1 more source

Symmetric Searchable Encryption with Sharing and Unsharing

2018
In this paper, we study Symmetric Searchable Encryption (SSE) in a multi-user setting in which each user dynamically shares its documents with selected other users, allowing sharees also to perform searches. We introduce the concept of a Symmetric Searchable Encryption with Sharing and Unsharing, an extension of Multi-Key Searchable Encryption (NSDI ...
Patel S., Persiano G., Yeo K.
openaire   +2 more sources

Memory leakage-resilient searchable symmetric encryption

Future Generation Computer Systems, 2016
Along with the popularization and rapid development of cloud-computing, more and more individuals and enterprises choose to store their data in cloud servers. However, in order to protect data privacy and deter illegal accesses, the data owner has to encrypt his data before outsourcing it to the cloud server.
Shuguang Dai, Huige Li, Fangguo Zhang
openaire   +1 more source

An Efficient Quantum Somewhat Homomorphic Symmetric Searchable Encryption

International Journal of Theoretical Physics, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sun, Xiaoqiang   +5 more
openaire   +1 more source

Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption

Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Symmetric Searchable Encryption (SSE) has received wide attention due to its practical application in searching on encrypted data. Beyond search, data addition and deletion are also supported in dynamic SSE schemes. Unfortunately, these update operations leak some information of updated data.
Shi-Feng Sun   +6 more
openaire   +1 more source

Garbled Searchable Symmetric Encryption

2014
In a searchable symmetric encryption (SSE) scheme, a client can keyword search over symmetrically-encrypted files which he stored on the server (ideally without leaking any information to the server). In this paper, we show the first multiple keyword search SSE scheme such that even the search formula \(f\) (AND, OR and so on) is kept secret.
openaire   +1 more source

Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation

Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, 2015
Searchable symmetric encryption (SSE) allows a client to encrypt his data in such a manner that the data can be efficiently searched. SSE has practical application in cloud storage, where a client outsources his encrypted data to a cloud server while maintaining the searchable ability over his data. Most of the current SSE schemes assume that the cloud
Rong Cheng   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy