نتایج جستجو برای: searchable encryption
تعداد نتایج: 29064 فیلتر نتایج به سال:
Searchable encryption has many applications including email systems and storage systems. The usefulness of searchable encryption derives from its support of keyword-testability. Keyword-testability means that a receiver of a ciphertext can test whether the ciphertext contains a specific keyword. Recently, Bellare et al. suggested an efficientlysearchable encryption scheme with keyword-recoverab...
The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it also raised concerns regarding the privacy sensitive data. To address these concerns, encryption techniques have been widely used. traditional schemes limit efficient search retrieval encrypted tackle this challenge, innovative approaches emerged, such as utilization Homomorphic Encryption (...
A Searchable Encryption System enables the clients to search encrypted keywords without compromising the security of the original data. Also, malicious users are able to take advantage of the Searchable Encryption Systems. At the same time, however, they can impose overloads to the system using a Brute force attack. As a result, it could be exposed through retrieving the critical information su...
Searchable encryption schemes allow users to perform keyword based searches on an encrypted database. Almost all existing such schemes only consider the scenario where a single user acts as both the data owner and the querier. However, most databases in practice do not just serve one user; instead, they support search and write operations by multiple users. In this paper, we systematically stud...
Searchable encryption schemes allow users to perform keyword based searches on an encrypted database. Almost all existing such schemes only consider the scenario where a single user acts as both the data owner and the querier. However, most databases in practice do not just serve one user; instead, they support search and write operations by multiple users. In this paper, we systematically stud...
Searching on remote encrypted data (commonly known as searchable encryption) is becoming an important technique in secure data outsourcing, since it allows users to outsource encrypted data to the third party and maintains the keyword searching on the data at the same time. It has been widely accepted in the literature that searchable encryption techniques should leak as little information as p...
Cloud computing is a popular distributed network and utility model based technology. Since in cloud the data is outsourced to third parties, the protection of confidentiality and privacy of user data becomes important. Different methods for securing the data in cloud have been proposed by researchers including but not limited to Oblivious RAM, Searchable Encryption, Functional Encryption, Homom...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید