نتایج جستجو برای: searchable encryption

تعداد نتایج: 29064  

Journal: :IEICE Transactions 2009
Ik Rae Jeong Jeong Ok Kwon Dowon Hong Dong Hoon Lee

Searchable encryption has many applications including email systems and storage systems. The usefulness of searchable encryption derives from its support of keyword-testability. Keyword-testability means that a receiver of a ciphertext can test whether the ciphertext contains a specific keyword. Recently, Bellare et al. suggested an efficientlysearchable encryption scheme with keyword-recoverab...

Journal: :Mathematics 2023

The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it also raised concerns regarding the privacy sensitive data. To address these concerns, encryption techniques have been widely used. traditional schemes limit efficient search retrieval encrypted tackle this challenge, innovative approaches emerged, such as utilization Homomorphic Encryption (...

2015
Junho Jeong Young Sik Hong

A Searchable Encryption System enables the clients to search encrypted keywords without compromising the security of the original data. Also, malicious users are able to take advantage of the Searchable Encryption Systems. At the same time, however, they can impose overloads to the system using a Brute force attack. As a result, it could be exposed through retrieving the critical information su...

2008
Feng Bao Robert H. Deng Xuhua Ding Yanjiang Yang

Searchable encryption schemes allow users to perform keyword based searches on an encrypted database. Almost all existing such schemes only consider the scenario where a single user acts as both the data owner and the querier. However, most databases in practice do not just serve one user; instead, they support search and write operations by multiple users. In this paper, we systematically stud...

Journal: :IJACT 2009
Yanjiang Yang Feng Bao Xuhua Ding Robert H. Deng

Searchable encryption schemes allow users to perform keyword based searches on an encrypted database. Almost all existing such schemes only consider the scenario where a single user acts as both the data owner and the querier. However, most databases in practice do not just serve one user; instead, they support search and write operations by multiple users. In this paper, we systematically stud...

Journal: :Journal of Communications Software and Systems 2018

Journal: :Proceedings on Privacy Enhancing Technologies 2016

Journal: :IACR Cryptology ePrint Archive 2013
Chang Liu Liehuang Zhu Mingzhong Wang Yu-an Tan

Searching on remote encrypted data (commonly known as searchable encryption) is becoming an important technique in secure data outsourcing, since it allows users to outsource encrypted data to the third party and maintains the keyword searching on the data at the same time. It has been widely accepted in the literature that searchable encryption techniques should leak as little information as p...

Journal: :CoRR 2015
B. T. Prasanna C. B. Akki

Cloud computing is a popular distributed network and utility model based technology. Since in cloud the data is outsourced to third parties, the protection of confidentiality and privacy of user data becomes important. Different methods for securing the data in cloud have been proposed by researchers including but not limited to Oblivious RAM, Searchable Encryption, Functional Encryption, Homom...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید