نتایج جستجو برای: searchable encryption

تعداد نتایج: 29064  

Journal: :DEStech Transactions on Engineering and Technology Research 2017

Journal: :IOP Conference Series: Earth and Environmental Science 2019

Journal: :Science China Information Sciences 2019

Journal: :Proceedings on Privacy Enhancing Technologies 2019

2010
Wei-Chuen Yau Raphael C.-W. Phan Swee-Huay Heng Bok-Min Goi

We propose a new definition for searchable proxy re-encryption scheme (Re-PEKS), define the first known searchable proxy re-encryption scheme with a designated tester (RedPEKS), and then give concrete constructions of both Re-PEKS and Re-dPEKS schemes that are secure in the random oracle model, along with the proofs.

2014
Kaoru Kurosawa

In a searchable symmetric encryption (SSE) scheme, a client can keyword search over symmetrically-encrypted files which he stored on the server (ideally without leaking any information to the server). In this paper, we show the first multiple keyword search SSE scheme such that even the search formula f (AND, OR and so on) is kept secret. Our scheme is based on an extended garbled circuit satis...

Journal: :IACR Cryptology ePrint Archive 2013
Raluca A. Popa Nickolai Zeldovich

We construct a searchable encryption scheme that enables keyword search over data encrypted with different keys. The scheme is practical and was designed to be included in a new system for protecting data confidentiality in client-server applications against attacks on the server.

Journal: :PoPETs 2015
Melissa Chase Emily Shen

In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s. First, we formalize an encryption paradigm that we call queryable encryption, which generalizes searchable symmetric encryption (SSE) an...

2013
ZACHARY A. KISSEL

OF A DISSERTATION SUBMITTED TO THE FACULTY OF THE DEPARTMENT OF COMPUTER SCIENCE IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY COMPUTER SCIENCE UNIVERSITY OF MASSACHUSETTS LOWELL 2013 Dissertation Supervisor: Jie Wang, Ph.D. Professor and Chair, Department of Computer Science Cloud storage has become increasingly prevalent in recent years. It provides a conve...

Journal: :J. Inf. Sci. Eng. 2016
Yang Yang Maode Ma

When data is outsourced to a remote storage server, searchable encryption plays an important role to protect data privacy while allowing users to retrieve data in the massive ciphertext. As far as we know, most of the existing searchable encryption schemes work based on the bilinear map. These schemes may not be secure in the quantum age. Both discrete logarithms and factorization can be solved...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید