نتایج جستجو برای: searchable encryption

تعداد نتایج: 29064  

2014
Zhi-Yi Shao Bo Yang

The offline keyword guessing attack (KG attack) is a new security threat to the searchable public key encryption with designated verifier. Many techniques have been proposed to resist such an attack. However, all these techniques are only secure against the outside KG attackers (neither the server nor the receiver), and have not solved the problem that the KG attacker is the server. In this pap...

Journal: :International Journal of Advanced Network, Monitoring and Controls 2019

Journal: :Wireless Communications and Mobile Computing 2022

As the product of third information technology revolution, Internet Things (IoT) has greatly altered our way lifetime. Cloud storage gradually become best choice for data processing due to its scalability and flexibility. However, cloud is not a completely trusted entity, such as tampering with user or leaking personal privacy. Therefore, usually adopts attribute-based encryption schemes accomp...

2009
Jan Camenisch Markulf Kohlweiss Alfredo Rial Caroline Sheedy

Searchable encryption schemes provide an important mechanism to cryptographically protect data while keeping it available to be searched and accessed. In a common approach for their construction, the encrypting entity chooses one or several keywords that describe the content of each encrypted record of data. To perform a search, a user obtains a trapdoor for a keyword of her interest and uses t...

Journal: :Computers & Security 2015
Thouraya Bouabana-Tebibel Abdellah Kaci

Data confidentiality in the Cloud Computing is a very challenging task. Encryption is one of the most secure methods ensuring this task, and searchable encryption techniques are used to search on encrypted data without the need for decryption. But, despite this secure measure some leaks may appear when searching over data. In this article, we propose to improve confidentiality of outsourced dat...

2016
Shiwei Zhang Guomin Yang Yi Mu

Nowadays an increasing amount of data stored in the public cloud need to be searched remotely for fast accessing. For the sake of privacy, the remote files are usually encrypted, which makes them difficult to be searched by remote servers. It is also harder to efficiently share encrypted data in the cloud than those in plaintext. In this paper, we develop a searchable encryption framework calle...

Journal: :IACR Cryptology ePrint Archive 2016
Wakaha Ogata Kaoru Kurosawa

In the model of no-dictionary verifiable searchable symmetric encryption (SSE) scheme, a client does not need to keep the set of keywords W in the search phase, where W is called a dictionary. Still a malicious server cannot cheat the client by saying that “your search word w does not exist in the dictionary W” when it exists. In the previous such schemes, it takes O(logm) time for the server t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید