A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
SERVER-AIDED PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH
unpublished
Index Terms-Public key encryption with keyword search, server-aided, off-line keyword guessing attack. ...
In this work, we provide a practical and applicable treatment on this security vulnerability by formalizing a new PEKS system named Server-Aided Public Key Encryption with Keyword Search (SA-PEKS). ...
We formalize a new PEKS system named Server-Aided Public Key Encryption with Keyword Search (SA-PEKS) to address the security vulnerability against (inside) offline KGA in existing PEKS systems. ...
fatcat:srix6z2ujvbo3j4k2vh7mbou5y
Efficient Verifiable Key-Aggregate Keyword Searchable Encryption for Data Sharing in Outsourcing Storage
2019
IEEE Access
In this scheme, the data owner distributes only one aggregate key to users for keyword search, decryption and verification, who can use the aggregate key to generate a single trapdoor for keyword search ...
In a secure data sharing system, users can selectively retrieve encrypted files by performing keyword search over the ciphertext of data. ...
If the file set S only contains one file, it is a practical public key encryption with keyword search scheme.
VI. ...
doi:10.1109/access.2019.2961169
fatcat:i2ufole3xnc3pixgwna5rwyjra
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation
[chapter]
2013
Lecture Notes in Computer Science
By using encrypted keyword(s) to search over encrypted data, they realized that the investigator can collect the necessary evidence while the private data of irrelevant users can be protected from disclosing ...
With the rapid development of cloud computing services, it is common to have a large server shared by many different users. ...
encrypted keyword(s) to the administrator; (2) with the investigator's public key, the administrator encrypts all the data files stored on the server. ...
doi:10.1007/978-3-642-36818-9_33
fatcat:uskroasi3jaw3frneb642atsbm
Efficient Encrypted Keyword Search for Multi-user Data Sharing
[chapter]
2016
Lecture Notes in Computer Science
Specifically, a data owner outsources a set of encrypted files to an untrusted server, shares it with a set of users, and a user is allowed to search keywords in a subset of files that he is authorized ...
In this paper, we provide a secure and e cient encrypted keyword search scheme for multi-user data sharing. ...
the server to search for the (encrypted) keyword in documents encrypted with di↵erent keys. ...
doi:10.1007/978-3-319-45744-4_9
fatcat:avp27dlzvng6fbgebluxfah6xm
Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation
2013
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
encrypted keyword E pI (w∗ ) as well as his public key pI ; on server side, the administrator encrypts all
the documents {W 1 , W 2 , . . ., W L } with the public key pI , where the resulting documents ...
; (2) with the investigator’s public key, the administrator encrypts all the data
files stored on the server. ...
doi:10.22667/jowua.2013.06.31.104
dblp:journals/jowua/HouSUY13
fatcat:7zw2jggwandsrfytzc2cgtszz4
Illustration on Secure and Efficient Multi-keyword Ranked Search on Encrypted Cloud Data
2018
International Journal for Research in Applied Science and Engineering Technology
There are so many techniques proposed to perform efficient search on the encrypted data in the cloud and out of them the ranked multi-keyword search have acquired more attention. ...
In this paper, we propose a model where an efficient search is performed on the encrypted information stored in the cloud by providing the ranks to the keywords. ...
Two keys are generated in this encryption mechanism one is the public key and the other is private key. ...
doi:10.22214/ijraset.2018.4608
fatcat:fyqtjb3w35fitmxd42sahw4dgq
Aiding Effective Encrypted Document Manipulation Incorporated with Document Categorization Technique in Cloud
2015
Procedia Computer Science
The homomorphic encryption technique is used for the building of a secure index which has the key role in the search process. ...
An efficient keyword based search on the encrypted cloud data is proposed here which provides marked improvement over the traditional boolean search approach used in cloud environment. ...
A method called Public Key Encryption with keyword Search (PEKS) 2 is proposed by D. Boneh, which handles the issue of searching in encrypted data. ...
doi:10.1016/j.procs.2015.02.120
fatcat:awtcnbjplrd4bn4ljlhhfmso4m
Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
2019
IEEE Transactions on Cloud Computing
Index Terms-Cloud storage, public-key encryption with keyword search, keyword guessing attacks, key renewal, blockchain. ...
Generally, if users conventionally encrypt the data, searching is impeded. Public-key encryption with keyword search (PEKS) resolves this tension. ...
ACKNOWLEDGEMENT This work is supported by in part by the National Key R&D Program of China under Grant 2017YFB0802000 and Grant 2017YFB0802300, in part by the National Natural Science Foundation of China ...
doi:10.1109/tcc.2019.2923222
fatcat:rsgnhhhnhvcf5in5ir7t7f2aya
Trapdoor Privacy in Public Key Encryption with Keyword Search: A Review
2022
IEEE Access
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting. ...
A keyword guessing attack (KGA) allows the attacker to successfully guess the correct keyword encrypted in a searchable ciphertext and trapdoor. ...
.: Trapdoor Privacy in Public Key Encryption with Keyword Search: A Review
TABLE 1 . 1 Abbreviation for PEKS Name Server-Aided Public Key Encryption with Keyword SearchSA-PEKS Public Key Authenticated ...
doi:10.1109/access.2022.3151429
fatcat:2gblkvolrnagde4e4yc6vatwxy
Multiuser Searchable Encryption with Token Freshness Verification
2017
Security and Communication Networks
In such scheme, a user possessing search key constructs search token at any time and consequently requests the server to search over encrypted data. ...
A Multiuser Searchable Encryption (MUSE) can be defined with the notion of Functional Encryption (FE) where a user constructs a search token from a search key issued by an Enterprise Trusted Authority ...
The first public key Searchable Encryption scheme is given by Boneh et al. [6] wherein a user with his private key can search over data encrypted with the corresponding public key. ...
doi:10.1155/2017/6435138
fatcat:2hypzuxb3nettgyubmamoue6ji
Efficient Multi-User and Multi-Keyword Ranked Search Scheme for Encrypted Cloud Data
2020
International Journal of Advanced Trends in Computer Science and Engineering
To allow the cloud servers to perform a search without understanding any statistics, to assemble a novel search and efficient technique based totally on the encrypted cloud statistics the usage of the ...
To obtain an efficient search, for every statistics person, a tree-based totally index encrypted with an additive order and secure characteristic is constructed. ...
First, the searchable encryption schemes need to aid multi-keyword search, and provide the equal user experience as looking in Google search with exceptional keywords; single-keyword search is some distance ...
doi:10.30534/ijatcse/2020/65932020
fatcat:ttluytxzj5drzcp4pttptj2664
Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation
2020
IEEE Access
We first introduce our provably secure scheme, named first construction, with respect to encrypted files and aggregate keys in a single-server setting. ...
The main construction guarantees the privacy of a search, encrypted files, and aggregate keys. ...
[1,m 2 ] ): This algorithm is run by a cloud server to perform keyword search over an encrypted keyword. ...
doi:10.1109/access.2020.2967793
fatcat:nwsvvtctczgbpcjbgide5fupu4
Research on Encryption and Key Aggregate Searchable Decryption Methods for Data Storage in Cloud Securely
2021
Turkish Journal of Computer and Mathematics Education
Now, not entirely the encryption keys but additionally, the search keys need for use, and customers ought to maintain their keys impervious and disbursed. ...
The variation to cloud-sharing files for the person for an encryption key technique to be used for lots of documents. ...
guessing attacks. public encryption key scheme(for inside key guessing assaults) and dual-server public-key authenticated encryption with keyword search (DPAEKS), explains a way to seek touchy information ...
doi:10.17762/turcomat.v12i10.5651
fatcat:zvwbzjrxgfbztc2xrvakq7io5i
Experiments in Encrypted and Searchable Network Audit Logs
2015
2015 International Conference on Emerging Information Technology and Engineering Solutions
In this paper we experiment with advances in Identity Based Encryption and Attribute-Based encryption schemes for auditing network logs. ...
Especially we consider the use case of privacy preserving search in network log audits. ...
For each keyword wi, the server computes the CP-ABE encryption ci of string (F LAG|K) using search keyword as access policy and PK public key 2) The choice of symmetric encryption for data encryption is ...
doi:10.1109/eites.2015.13
fatcat:u7wh6lwhovbxpbyxthexbg5n3i
EFURMS: An Efficient Scheme for File Upload and Ranked Multi-Keyword Search over Encrypted Data in Cloud
2021
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
These techniques result in reducing the document upload time and speeding up the process of accessing data efficiently using multi-keyword search with top-'K' value. ...
To protect data from leakage, the widely used technique is to encrypt the data before uploading into cloud storage servers. ...
After receiving the access user gives a public key, and multiple keywords to the cloud server and sets the' k' value to get top 'k' search results. ...
doi:10.35940/ijitee.d8464.0210421
fatcat:nwtlnbev4rhahncxykd7jtmdgm
« Previous
Showing results 1 — 15 out of 3,002 results