نتایج جستجو برای: searchable encryption
تعداد نتایج: 29064 فیلتر نتایج به سال:
Searchable encryption allows an untrusted server to search on encrypted data without knowing the underlying data contents. Traditional searchable encryption schemes focus only on single keyword or conjunctive keyword search. Several solutions have been recently proposed to design more expressive search criteria, but most of them are in the setting of symmetric key encryption. In this paper, bas...
Searchable symmetric encryption (SSE) has been widely applied in the encrypted database for queries practice. Although SSE is powerful and feature-rich, it always plagued by information leaks. Some recent attacks point out that forward privacy which disallows leakage from update operations, now becomes a basic requirement any newly designed schemes. However, subsequent search operations can sti...
In this paper proposes multi-user searchable encryption with the help of order preserve encryption for providing efficient encrypted data. when proposed these constructions it formally defines the multiuser settings for ranked keyword search by using searchable symmetric encryption and order preserve symmetric encryption. Consider a dataowner is the administrator who can uploads the files befor...
Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a ciphertext with key encryption, and the other party with another key receives the ciphertext. Encryp...
To solve the problem of searching on encrypted data, many keyword search schemes have been proposed in recent years. The goal of such schemes is to enable a user to give an untrusted storage server the ability only to test whether an encrypted document contains a few keywords without learning anything else about the document. In this paper, we are concerned with decrypting the searched results ...
Traditional encryption systems are designed in such a way that either the whole datais decrypted, if the encryption and decryption keys match, or nothing is decryptedotherwise. However, there are applications that require a more flexible encryptionsystem which supports decrypting data partially. Searchable encryption is a tech-nique that provides functionalities to decrypt data ...
The SM9 algorithm is an Identity-Based Encryption (IBE) independently made by China. existing searchable encryption scheme cannot be effective against insider keyword guessing attacks and violates users’ data privacy. This article utilizes the method to propose a Registered Public Keyword Searchable based on (RKSE-SM9), which uses user keys in registration algorithm. For RKSE-SM9 generate ciphe...
Keeping pace with the increase of digital information in use, Cloud storage is in service, which can store one’s data from distance through network and various devices and easy to access. Unlike the existing removable storage necessary in order to carry data, it is used many users because it has no limit of memory capacity and no need to carry storage medium. As many users save a great volume o...
Keeping pace with the increase of digital information in use, Cloud storage is in service, which can store one’s data from distance through network and various devices and easy to access. Unlike the existing removable storage necessary in order to carry data, it is used many users because it has no limit of memory capacity and no need to carry storage medium. As many users save a great volume o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید