Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis
نویسندگان
چکیده
The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it also raised concerns regarding the privacy sensitive data. To address these concerns, encryption techniques have been widely used. traditional schemes limit efficient search retrieval encrypted tackle this challenge, innovative approaches emerged, such as utilization Homomorphic Encryption (HE) in Searchable (SE) schemes. This paper provides a comprehensive analysis advancements HE-based privacy-preserving techniques, focusing on their application SE. main contributions work include identification classification existing SE that utilize HE, types HE used SE, an examination how shapes process structure enables additional functionalities, promising directions for future research findings reveal increasing usage schemes, particularly Partially Encryption. popularity type especially Paillier’s cryptosystem, can be attributed to its simplicity, proven security properties, availability open-source libraries. highlights prevalence index-based using support ranked multi-keyword queries, need further exploration functionalities verifiability ability authorize revoke users. Future exploring other alongside addressing omissions like fuzzy keyword search, leveraging recent Fully
منابع مشابه
Private Genome Analysis through Homomorphic Encryption
BACKGROUND The rapid development of genome sequencing technology allows researchers to access large genome datasets. However, outsourcing the data processing o the cloud poses high risks for personal privacy. The aim of this paper is to give a practical solution for this problem using homomorphic encryption. In our approach, all the computations can be performed in an untrusted cloud without re...
متن کاملSearchable encryption
We built a system supporting encrypted substring search of a text document. The user can encrypt and upload files to a server. The client can also query the server to ask whether an encrypted file contains a particular string of characters. The query, like the file, is not sent in plaintext but is encrypted or hashed. The server should be able to respond correctly to queries without learning th...
متن کاملHomomorphic Encryption
Fully homomorphic encryption (FHE) has been called the “Swiss Army knife of cryptography”, since it provides a single tool that can be uniformly applied to many cryptographic applications. In this tutorial we study FHE and describe its different properties, relations with other concepts in cryptography, and constructions. We briefly discuss the three generations of FHE constructions since Gentr...
متن کاملBrowse searchable encryption schemes: Classification, methods and recent developments
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
متن کاملSearchable Symmetric Encryption- A Survey
Cryptology has opened possibilities for a fully secure communication and transfer of information between parties. With time, a lot of primitives have been proposed as improvements of the earlier ones. This paper focuses on a relatively new primitive, Searchable Symmetric Encryption. It allows updations in the information while it is stored on a trusted third party due to lack of resources. Earl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics
سال: 2023
ISSN: ['2227-7390']
DOI: https://doi.org/10.3390/math11132948