搜索结果: 1-15 共查到“密码学 keyword search”相关记录17条 . 查询时间(0.046 秒)
ABFKS: Attribute-Based Encryption with Functional Keyword Search in Fog Computing
Attribute-based encryption Keyword search Fog computing
font style='font-size:12px;'>
2019/8/2
We provide a new frame in this paper, the ciphertext-policy attribute-based encryption with functional keyword search (ABFKS) in fog computing. The ABFKS achieves functional keyword search and peer-pe...
Lattice-Based Public Key Encryption with Keyword Search
public-key cryptography PEKS
font style='font-size:12px;'>
2017/12/19
Public key Encryption with Keyword Search (PEKS) aims in mitigating the impacts of data privacy versus utilization dilemma by allowing any user in the system to send encrypted files to the server to b...
Efficient Attribute-Based Secure Keyword Search on the Cloud Storage
Secure Keyword Search Cloud Storage
font style='font-size:12px;'>
2017/8/21
Cloud computing is very popular for its computing and storage capacity at lower cost. More and more data are being moved to the cloud to reduce storage cost. On the other hand, since the cloud is not ...
Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC
Encrypted Keyword Search Searchable Encryption Random Oracle Model
font style='font-size:12px;'>
2017/7/14
Outsourcing data storage to the cloud securely and retrieving the remote data in an efficient way is a very significant research topic, with high relevance to secure cloud deployment. With the ever gr...
New Framework for Secure Server-Designation Public Key Encryption with Keyword Search
Computer Networks Information Security Distributed Systems
font style='font-size:12px;'>
2016/4/6
Recently, a new framework, called secure server-designation public key encryption
with keyword search (SPEKS), was introduced to improve the security of dPEKS
(which suffers from the on-line keyword...
CLKS: Certificateless Keyword Search on Encrypted Data
keyword search certificateless cryptography
font style='font-size:12px;'>
2015/12/23
Keyword search on encrypted data enables one to search keyword
ciphertexts without compromising keyword security. We further investigate
this problem and propose a novel variant, dubbed certificatel...
A Generic Construction for Verifiable Attribute-based Keyword Search Schemes
Cloud computing searchable encryption keyword ranked search attribute-based encryption
font style='font-size:12px;'>
2015/12/23
Cloud data owners encrypt their documents before outsourcing to provide their privacy. They could determine a search control policy and delegate the ability of search token generation to the users who...
VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
cloud computing verifiable search
font style='font-size:12px;'>
2014/3/11
It is common nowadays for data owners to outsource their data to the cloud. Since the cloud cannot be fully trusted, the outsourced data should be encrypted. This however brings a range of problems, s...
Public-Key Encryption with Cluster-Chain-based Keyword Search
public-key cryptography
font style='font-size:12px;'>
2012/6/14
It is widely acknowledged that the keyword search performance and the privacy of keywords are equally important for keyword searchable ciphertexts. To our knowledge, no public-key-encryption-based wor...
Public-Key Encryption with Fuzzy Keyword Search withstanding Keyword Guessing Attacks
Public-key encryption with keyword search keyword guessing attack public-key encryption with fuzzy keyword search anonymous identity-based encryption
font style='font-size:12px;'>
2010/12/14
With tremendous interests having been attracted, public-key encryption with keyword search (PEKS) achieves the searchability of encrypted keywords without sharing a secret between the sender and the r...
PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search
Predicate Privacy PEKS Randomization
font style='font-size:12px;'>
2010/9/9
Recently, Shen, Shi, and Waters introduced the notion of predicate privacy, i.e., the property that t(x) reveals no information about the encoded predicate p, and proposed a scheme that achieves predi...
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Efficient Fuzzy Keyword Search Encrypted Data Cloud Computing
font style='font-size:12px;'>
2009/12/29
As Cloud Computing becomes prevalent, more and more sensitive information
are being centralized into the cloud. For the protection of data privacy, sensitive data usually
have to be encrypted before...
Oblivious Keyword Search
oblivious transfer blind signature oblivious polynomial evaluation
font style='font-size:12px;'>
2009/4/15
In this paper, we introduce a notion of Oblivious Keyword
Search (OKS). Let W be the set of possible keywords. In the commit
phase, a database supplier T commits n data. In each transfer subphase, a...
Public Key Encryption with keyword Search
Public Key Encryption keyword Search
font style='font-size:12px;'>
2009/4/10
We study the problem of searching on data that is encrypted using a public key system.
Consider user Bob who sends email to user Alice encrypted under Alice's public key. An email
gateway wants to t...
Public Key Encryption with Keyword Search Revisited
KPublic Key Encryption with Keyword Search Removing Secure Channel Refreshing Keywords
font style='font-size:12px;'>
2009/2/13
The public key encryption with keyword search (PEKS) scheme recently proposed by
Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords
without compromising the securi...