Results 11 to 20 of about 3,048 (208)
Searchable Symmetric Encryption with Forward Search Privacy [PDF]
Searchable symmetric encryption (SSE) has been widely applied in the encrypted database for queries in practice. Although SSE is powerful and feature-rich, it is always plagued by information leaks. Some recent attacks point out that forward privacy which disallows leakage from update operations, now becomes a basic requirement for any newly designed
Jin Li +6 more
openaire +4 more sources
IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications
Searchable Encryption (SE) has been extensively examined by both academic and industry researchers. While many academic SE schemes show provable security, they usually expose some query information (e.g., search and access patterns) to achieve high ...
Guofeng Wang +5 more
doaj +3 more sources
Searchable Symmetric Encryption for Restricted Search [PDF]
The proliferation of cloud computing highlights the importance of techniques that permit both secure storage of sensitive data and flexible data management at the same time.
Mate Horvath, Istvan Vajda
doaj +4 more sources
Multi-level Access in Searchable Symmetric Encryption [PDF]
Remote storage delivers a cost effective solution for data storage. If data is of a sensitive nature, it should be encrypted prior to outsourcing to ensure confidentiality; however, searching then becomes challenging.
C Rompay Van +8 more
core +3 more sources
Rethinking Searchable Symmetric Encryption
ISBN:978-1-6654-9336 ...
Gui, Zichen +2 more
openaire +2 more sources
Substring-Searchable Symmetric Encryption [PDF]
Abstract In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s.
Melissa Chase, Emily Shen
openaire +1 more source
Searchable Symmetric Encryption
AbstractSearchable symmetric encryption allows operating on encrypted data, particularly keyword-based search on documents and range-based search on spatial data. Various methods can be used in Searchable symmetric encryption, such as order-preserving or fully homomorphic encryption, for different levels of information leakage.
Cyrill Krähenbühl, Adrian Perrig
openaire +1 more source
Dynamic Local Searchable Symmetric Encryption
In this article, we tackle for the first time the problem of dynamic memory-efficient Searchable Symmetric Encryption (SSE). In the term "memory-efficient" SSE, we encompass both the goals of local SSE, and page-efficient SSE. The centerpiece of our approach is a novel connection between those two goals.
Minaud, Brice, Reichle, Michael
openaire +3 more sources
A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods
Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud.
Guangchun Luo +3 more
doaj +1 more source
Cloud computing offers the possibility of providing suitable access within a network for a set of resources. Many users use different services for outsourcing their data within the cloud, saving and mitigating the local storage and other resources ...
Marius Iulian Mihailescu +1 more
doaj +1 more source

