نتایج جستجو برای: Searchable Encryption

تعداد نتایج: 29064  

Alimoradi, Reza, Gholami, Ahmad, Noorallahzadeh, Mohammad Hossein,

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

Journal: :Proceedings on Privacy Enhancing Technologies 2015

Journal: :International Journal of Security and Its Applications 2017

Journal: :IEEE Latin America Transactions 2016

2017
Daniel Homann Christian Göge Lena Wiese

Though cloud databases offer advantages in terms of maintenance cost, they require encryption in order to protect confidential records. Specialized searchable encryption schemes are needed to provide the functionality of privacy preserving search on encrypted data. In many use cases, a search which also returns the correct documents when the search term was misspelled is very desirable. Therefo...

Journal: :IACR Cryptology ePrint Archive 2009
Jae Hong Seo Tetsutaro Kobayashi Miyako Ohkubo Koutarou Suzuki

Efficient and privacy-preserving constructions for search functionality on encrypted data is important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Based Encryption (HIBE) schemes is useful primitives that can be applicable to searchable encryptions [4], such as ID-based searchable encryption, temporary searchable encryption [1], and anonymous for...

Journal: :Lecture Notes in Computer Science 2022

In this article, we tackle for the first time problem of dynamic memory-efficient Searchable Symmetric Encryption (SSE). term “memory-efficient” SSE, encompass both goals local and page-efficient SSE. The centerpiece our approach is a novel connection between those two goals. We introduce map, called Generic Local Transform, which takes as input SSE scheme with certain special features, outputs...

2007
Thomas Fuhr Pascal Paillier

As such, public-key encryption with keyword search (a.k.a PEKS or searchable encryption) does not allow the recipient to decrypt keywords i.e. encryption is not invertible. This paper introduces searchable encryption schemes which enable decryption. An additional feature is that the decryption key and the trapdoor derivation key are totally independent, thereby complying with many contexts of a...

Journal: :Journal of the Korea Society of Computer and Information 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید