نتایج جستجو برای: searchable encryption

تعداد نتایج: 29064  

Journal: :IEEE Transactions on Services Computing 2020

Journal: :IEICE Transactions on Information and Systems 2009

2013
Artūrs Bačkurs Daniel Grier Adam Sealfon Po-An Tsai

We built a system supporting encrypted substring search of a text document. The user can encrypt and upload files to a server. The client can also query the server to ask whether an encrypted file contains a particular string of characters. The query, like the file, is not sent in plaintext but is encrypted or hashed. The server should be able to respond correctly to queries without learning th...

2008
Saeed Sedghi Jeroen Doumen Pieter H. Hartel Willem Jonker

Searchable encryption is a technique that allows a client to store data in encrypted form on a curious server, such that data can be retrieved while leaking a minimal amount of information to the server. Many searchable encryption schemes have been proposed and proved secure in their own computational model. In this paper we propose a generic model for the analysis of searchable encryptions. We...

Journal: :Journal of Communications and Information Networks 2016

Journal: :IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2019

Journal: :JIPS 2013
Sun-Ho Lee Im-Yeong Lee

Cloud storage is provided as a service in order to keep pace with the increasing use of digital information. It can be used to store data via networks and various devices and is easy to access. Unlike existing removable storage, many users can use cloud storage because it has no storage capacity limit and does not require a storage medium. Cloud storage reliability has become a topic of importa...

Journal: :International Journal of Engineering & Technology 2018

Journal: :I. J. Network Security 2018
Lina Zou Xueying Wang Shoulin Yin

Searchable encryption algorithm is a hot issue nowadays. It can sort the results of searching and return the optimal matching files. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a ciphertext with key encryption, the other party with another key receives the ciphertext. Encryption key is not the same as the decryption key, and can...

2012
Fei Han Jing Qin Huawei Zhao Jiankun Hu

Users are inclined to share sensitive data in a remote server if no strong security mechanism is in place. Searchable encryption satisfies the need of users to execute a search on encrypted data. Previous searchable encryption method such as “public key encryption with keyword search (PEKS)” restricted the data access to certain users, because only the assigned users were able to search on the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید