نتایج جستجو برای: searchable encryption

تعداد نتایج: 29064  

Journal: :IACR Cryptology ePrint Archive 2017
Peng Xu Xia Gao Wei Wang Willy Susilo Qianhong Wu Hai Jin

Public-key encryption with keyword search (PEKS) allows a sender to generate keyword-searchable ciphertexts using a receiver’s public key and upload them to a server. Upon receiving a keyword-search trapdoor from the receiver, the server finds all matching ciphertexts. Due to the characteristics of public-key encryption, PEKS is inherently suitable for the application of numerous senders. Hence...

Journal: :IACR Cryptology ePrint Archive 2005
Lucas Ballard Matthew Green Breno de Medeiros Fabian Monrose

We consider the problem of using untrusted components to build correlation-resistant survivable storage systems that protect file replica locations, while allowing nodes to continuously re-distribute files throughout the network. The principal contribution is a chosen-ciphertext secure, searchable public key encryption scheme which allows for dynamic re-encryption of ciphertexts, and provides f...

2014
David Cash Stefano Tessaro

This paper proves a lower bound on the trade-off between server storage size and the locality of memory accesses in searchable symmetric encryption (SSE). Namely, when encrypting an index of N identifier/keyword pairs, the encrypted index must have size ω(N) or the scheme must perform searching with ω(1) non-contiguous reads to memory or the scheme must read many more bits than is necessary to ...

Journal: :IACR Cryptology ePrint Archive 2015
James Alderman Christian Janson Keith M. Martin Sarah Louise Renwick

When outsourcing the storage of sensitive data to an (untrusted) remote server, a data owner may choose to encrypt the data beforehand to preserve confidentiality. However, it is then difficult to efficiently retrieve specific portions of the data as the server is unable to identify the relevant information. Searchable encryption has been well studied as a solution to this problem, allowing dat...

Journal: :IACR Cryptology ePrint Archive 2013
Seny Kamara Charalampos Papamanthou

Searchable symmetric encryption (SSE) enables a client to outsource a collection of encrypted documents in the cloud and retain the ability to perform keyword searches without revealing information about the contents of the documents and queries. Although efficient SSE constructions are known, previous solutions are highly sequential. This is mainly due to the fact that, currently, the only met...

Journal: :IACR Cryptology ePrint Archive 2016
Iraklis Leontiadis Ming Li

We address the problem of substring searchable encryption. A single user produces a big stream of data and later on wants to learn the positions in the string that some patterns occur. Although current techniques exploit auxiliary data structures to achieve efficient substring search on the server side, the cost at the user side may be prohibitive. We revisit the work of substring searchable en...

Journal: :CoRR 2016
Shiyu Ji

In this short note we argue that the state-of-art inverted index based public key searchable encryption scheme proposed by Wang et al may not be completely correct by giving a counterexample.

Journal: :Security and Communication Networks 2022

Cloud computing can provide users with sufficient resources, storage, and bandwidth to meet their needs. Data security privacy protection are among the new threats faced by users. Searchable encryption is combination of search technology technology. upload user’s data cloud server after special encryption, realize function retrieving according keywords. Comparatively symmetric searchable (SSE),...

Journal: :Computers, materials & continua 2022

With the increasing popularity of cloud storage, data security on has become increasingly visible. Searchable encryption ability to realize privacy protection and in cloud. However, with continuous development quantum computing, standard Public-key Encryption Keyword Search (PEKS) scheme cannot resist quantum-based keyword guessing attacks. Further, credibility server also poses a significant t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید