نتایج جستجو برای: searchable encryption

تعداد نتایج: 29064  

2015
Emily Shen

In this paper, we consider a setting where aclient wants to outsource storage of a large amount ofprivate data and then perform substring search querieson the data – given a data string s and a search stringp, find all occurrences of p as a substring of s. First, weformalize an encryption paradigm that we call queryableencryption, which generalizes searchable symmetric e...

2016
Anil Kumar

the ability of preferentially sharing encrypted data with unlike users through public cloud storage might really ease security distress, by possibility data disclose in the cloud. A key test to design such encryption idea lies in the well-organized management encryption keys. The preferred flexibility of allocating any group documents with any group of users by attaining weightage different enc...

Journal: :CoRR 2017
Xiangfu Song Changyu Dong Dandan Yuan Qiuliang Xu Minghao Zhao

Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will very likely to become mandatory in the design of new searchable encryption schemes. For a long time, forward privacy implies inefficiency and th...

Journal: :IACR Cryptology ePrint Archive 2017
Raphael Bost Pierre-Alain Fouque

After the development of practical searchable encryption constructions, allowing for secure searches over an encrypted dataset outsourced to an untrusted server, at the expense of leaking some information to the server, many new attacks have recently been developed, targeting this leakage in order to break the confidentiality of the dataset or of the queries, through leakage abuse attacks. Thes...

Journal: :Mathematics 2023

To protect the privacy of cloud data, encryption before uploading provides a solution. However, searching for target data in ciphertext takes effort. Therefore, searchable has become an important research topic. On other hand, since advancement quantum computers will lead to crisis cracking traditional algorithms, it is necessary design schemes that can resist attacks. we propose multi-keyword ...

2005
Sherman S.M. Chow

Identity (or identifier) based encryption has shown to be a useful cryptographic schema enabling secure yet flexible role-based access control. In this paper, we propose a new notion named as exclusionintersection encryption: the sender can specify the targeted groups that are legitimated and interested in reading the documents in the encryption algorithm; there exists a trusted key generation ...

2014
P. G Kathiravan

The arrival of cloud computing the new pattern for data outsourcing and high quality data service is great flexibility and economic saving. However fear about the sensitive information on cloud to be protecting the data privacy problems sensitive information has to be encrypted before outsourcing, which creates the effective data utilization services a very big challenging task. Symmetric Searc...

2015
Emily Shen

In this paper, we consider a setting where aclient wants to outsource storage of a large amount ofprivate data and then perform substring search querieson the data – given a data string s and a search stringp, find all occurrences of p as a substring of s. First, weformalize an encryption paradigm that we call queryableencryption, which generalizes searchable symmetric e...

Journal: :IEEE Access 2023

The use of encryption is essential to protect sensitive data, but it often poses challenges when comes locating and retrieving information without decryption. Searchable provides an effective mechanism that achieves secure search over encrypted data. In this paper a new approach address the fine-grained Blockchain Assisted ciphertext policy decentralized attribute-based (BA-CP-DABE) in cloud ha...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید