Results 211 to 220 of about 391 (240)
Some of the next articles are maybe not open access.
Dynamic searchable symmetric encryption
Proceedings of the 2012 ACM conference on Computer and communications security, 2012Searchable symmetric encryption (SSE) allows a client to encrypt its data in such a way that this data can still be searched. The most immediate application of SSE is to cloud storage, where it enables a client to securely outsource its data to an untrusted cloud provider without sacrificing the ability to search over it.SSE has been the focus of ...
Seny Kamara +2 more
openaire +1 more source
Boolean symmetric searchable encryption
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013In this article we tackle the issue of searchable encryption with a generalized query model. Departing from many previous works that focused on queries consisting of a single keyword, we consider the the case of queries consisting of arbitrary boolean expressions on keywords, that is to say conjunctions and disjunctions of keywords and their complement.
Tarik Moataz, Abdullatif Shikfa
openaire +1 more source
Computationally Efficient Searchable Symmetric Encryption
2010Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little information as possible to the server. In the symmetric searchable encryption domain, the storage and the retrieval are performed by the same client.
Liesdonk, van, P.P. +4 more
openaire +3 more sources
Attribute-Based Symmetric Searchable Encryption
2020Symmetric Searchable Encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data while preserving the privacy of both the files and the queries. Unfortunately, majority of the SSE schemes allows users to either decrypt the whole ciphertext or nothing at all.
Dang, Hai-Van +3 more
openaire +1 more source
Forward secure searchable symmetric encryption
2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 2017Data outsourcing to third party clouds poses numerous data security threats. Access by unauthorized users is one of the security threat to the outsourced data. Unauthorized access can be avoided by encrypting the data before outsourcing. However, encrypting data before outsourcing renders it unsearchable to the data owner. Searchable encryption schemes
Muhammad Saqib Niaz, Gunter Saake
openaire +1 more source
Symmetric Searchable Encryption for Database Applications
2011 14th International Conference on Network-Based Information Systems, 2011This paper proposes an efficient symmetric searchable encryption to achieve indistinguishability of indexes and trapdoors. Previous symmetric searchable encryptions are either insecure because their trapdoor generation algorithms are not probabilistic or inefficient because of the heavy cost due to pairing-based computation.
Masayuki Yoshino +2 more
openaire +1 more source
Toward Practical Searchable Symmetric Encryption
2013Searchable symmetric encryption is a good building block toward ensuring privacy preserving keyword searches in a cloud computing environment. This area has recently attracted a great deal of attention and a large quantity of research has been conducted.
Wakaha Ogata +3 more
openaire +1 more source
Blockchain-based searchable symmetric encryption scheme
Computers & Electrical Engineering, 2019Abstract The mechanism for traditional searchable symmetric encryption (SSE) is pay-then-use. This situation is not fair to user because the cloud server may return wrong results. Besides, the user needs to verify these results locally. In order to ensure fairness and reduce user’s calculations, we combined blockchain with SSE, and proposed a fair ...
Huige Li +3 more
openaire +1 more source
Searchable symmetric encryption over multiple servers
Cryptography and Communications, 2017zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Geong Sen Poh +2 more
openaire +1 more source
Improved Indistinguishability for Searchable Symmetric Encryption
2020This work presents a new experiment defining indistinguishability for searchable symmetric encryption to include security against published practical attacks. The proposed experiment allows the adversaries to use their prior knowledge about the stored documents to win.
Chin, Ji Jian, Mohamad, Moesfa Soeheila
openaire +1 more source

