Academic literature on the topic 'Dynamic Searchable Symmetric Encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Dynamic Searchable Symmetric Encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Dynamic Searchable Symmetric Encryption"

1

Du, Ruizhong, Yuqing Zhang, and Mingyue Li. "Database Padding for Dynamic Symmetric Searchable Encryption." Security and Communication Networks 2021 (December 31, 2021): 1–12. http://dx.doi.org/10.1155/2021/9703969.

Full text
Abstract:
Dynamic symmetric searchable encryption (DSSE) that enables the search and update of encrypted databases outsourced to cloud servers has recently received widespread attention for leakage-abuse attacks against DSSE. In this paper, we propose a dynamic database padding method to mitigate the threat of data leakage during the update operation of outsourcing data. First, we introduce an outlier detection technology where bogus files are generated for padding according to the outlier factors, hiding the document information currently matching search keywords. Furthermore, we design a new index str
APA, Harvard, Vancouver, ISO, and other styles
2

Guo, Chen, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li, and Ting Wu. "Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing." Information 9, no. 10 (2018): 242. http://dx.doi.org/10.3390/info9100242.

Full text
Abstract:
With the advent of cloud computing, more and more users begin to outsource encrypted files to cloud servers to provide convenient access and obtain security guarantees. Searchable encryption (SE) allows a user to search the encrypted files without leaking information related to the contents of the files. Searchable symmetric encryption (SSE) is an important branch of SE. Most of the existing SSE schemes considered single-user settings, which cannot meet the requirements for data sharing. In this work, we propose a multi-user searchable symmetric encryption scheme with dynamic updates. This sch
APA, Harvard, Vancouver, ISO, and other styles
3

Kissel, Zachary A., and Jie Wang. "Generic Adaptively Secure Searchable Phrase Encryption." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 4–20. http://dx.doi.org/10.1515/popets-2017-0002.

Full text
Abstract:
Abstract In recent years searchable symmetric encryption has seen a rapid increase in query expressiveness including keyword, phrase, Boolean, and fuzzy queries. With this expressiveness came increasingly complex constructions. Having these facts in mind, we present an efficient and generic searchable symmetric encryption construction for phrase queries. Our construction is straightforward to implement, and is proven secure under adaptively chosen query attacks (CQA2) in the random oracle model with an honest-but-curious adversary. To our knowledge, this is the first encrypted phrase search sy
APA, Harvard, Vancouver, ISO, and other styles
4

Etemad, Mohammad, Alptekin Küpçü, Charalampos Papamanthou, and David Evans. "Efficient Dynamic Searchable Encryption with Forward Privacy." Proceedings on Privacy Enhancing Technologies 2018, no. 1 (2018): 5–20. http://dx.doi.org/10.1515/popets-2018-0002.

Full text
Abstract:
Abstract Searchable symmetric encryption (SSE) enables a client to perform searches over its outsourced encrypted files while preserving privacy of the files and queries. Dynamic schemes, where files can be added or removed, leak more information than static schemes. For dynamic schemes, forward privacy requires that a newly added file cannot be linked to previous searches. We present a new dynamic SSE scheme that achieves forward privacy by replacing the keys revealed to the server on each search. Our scheme is efficient and parallelizable and outperforms the best previous schemes providing f
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Xi, Ye Su, and Jing Qin. "A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security." Security and Communication Networks 2020 (October 20, 2020): 1–13. http://dx.doi.org/10.1155/2020/8893016.

Full text
Abstract:
Dynamic Searchable Symmetric Encryption for Multiuser (M-DSSE) is an advanced form of symmetric encryption. It extends the traditional symmetric encryption to support the operations of adding and deleting the encrypted data and allow an authenticated group of data users to retrieve their respective desired encrypted data in the dynamic database. However, M-DSSE would suffer from the privacy concerns regarding forward and backward security. The former allows an attacker to identify the keywords contained in the added data by lunching file-injection attacks, while the latter allows to utilize th
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Jiafan, and Sherman S. M. Chow. "Forward and Backward-Secure Range-Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (2021): 28–48. http://dx.doi.org/10.2478/popets-2022-0003.

Full text
Abstract:
Abstract Dynamic searchable symmetric encryption (DSSE) allows a client to query or update an outsourced encrypted database. Range queries are commonly needed. Previous range-searchable schemes either do not support updates natively (SIGMOD’16) or use file indexes of many long bit-vectors for distinct keywords, which only support toggling updates via homomorphically flipping the presence bit. (ESORICS’18). We propose a generic upgrade of any (inverted-index) DSSE to support range queries (a.k.a. range DSSE), without homomorphic encryption, and a specific instantiation with a new trade-off redu
APA, Harvard, Vancouver, ISO, and other styles
7

Cui, Shujie, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, and Giovanni Russello. "Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage." ACM Transactions on Privacy and Security 24, no. 3 (2021): 1–35. http://dx.doi.org/10.1145/3446920.

Full text
Abstract:
Searchable Encryption (SE) is a technique that allows Cloud Service Providers to search over encrypted datasets without learning the content of queries and records. In recent years, many SE schemes have been proposed to protect outsourced data. However, most of them leak sensitive information, from which attackers could still infer the content of queries and records by mounting leakage-based inference attacks, such as the count attack and file-injection attack . In this work, first we define the leakage in searchable encrypted databases and analyse how the leakage is leveraged in existing leak
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Yu, Yin Li, and Yifan Wang. "Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search." Security and Communication Networks 2020 (July 16, 2020): 1–16. http://dx.doi.org/10.1155/2020/7298518.

Full text
Abstract:
Searchable symmetric encryption that supports dynamic multikeyword ranked search (SSE-DMKRS) has been intensively studied during recent years. Such a scheme allows data users to dynamically update documents and retrieve the most wanted documents efficiently. Previous schemes suffer from high computational costs since the time and space complexities of these schemes are linear with the size of the dictionary generated from the dataset. In this paper, by utilizing a shallow neural network model called “Word2vec” together with a balanced binary tree structure, we propose a highly efficient SSE-DM
APA, Harvard, Vancouver, ISO, and other styles
9

Bilbul, Salim, and Ayad Abdulsada. "Backward Private Searchable Symmetric Encryption with Improved Locality." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (2021): 17–26. http://dx.doi.org/10.37917/ijeee.17.2.3.

Full text
Abstract:
Searchable symmetric encryption (SSE) enables clients to outsource their encrypted documents into a remote server and allows them to search the outsourced data efficiently without violating the privacy of the documents and search queries. Dynamic SSE schemes (DSSE) include performing update queries, where documents can be added or removed at the expense of leaking more information to the server. Two important privacy notions are addressed in DSSE schemes: forward and backward privacy. The first one prevents associating the newly added documents with previously issued search queries. While the
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Ke, Xiaolei Dong, Zhenfu Cao, and Jiachen Shen. "Dynamic searchable symmetric encryption schemes with forward and backward security." IOP Conference Series: Materials Science and Engineering 715 (January 3, 2020): 012062. http://dx.doi.org/10.1088/1757-899x/715/1/012062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Dynamic Searchable Symmetric Encryption"

1

Nordahl, Christian, and Malin Lindström. "The BXT-Bitmap : An Efficient Searchable Symmetric Encryption Scheme." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chenette, Nathan Lee. "Symmetric schemes for efficient range and error-tolerant search on encrypted data." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/48976.

Full text
Abstract:
Large-scale data management systems rely more and more on cloud storage, where the need for efficient search capabilities clashes with the need for data confidentiality. Encryption and efficient accessibility are naturally at odds, as for instance strong encryption necessitates that ciphertexts reveal nothing about underlying data. Searchable encryption is an active field in cryptography studying encryption schemes that provide varying levels of efficiency, functionality, and security, and efficient searchable encryption focuses on schemes enabling sub-linear (in the size of the database) sear
APA, Harvard, Vancouver, ISO, and other styles
3

Škoda, Martin. "Implementace symetrické blokové šifry AES na moderních procesorech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220616.

Full text
Abstract:
The main aim of master's thesis is usage of new instructions from instruction set called Intel® Advanced Encryption Standard New Instructions (AES-NI), which is available on processors with code name Westmere and newer. In theoretical part, there are described symmetric block ciphers and their operational modes. Cipher AES is described in details, especially used block transformations, key expansion and equivalent inverse cipher. Next topic is description of instructions of AES-NI instruction set – their function is explained using pseudo codes of instructions and there are examples of their u
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Chia-Feng, and 吳嘉峰. "Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/69702371852681789221.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電機工程學研究所<br>103<br>Searchable symmetric encryption (SSE) is a more and more important technique for cloud computing. It lets us can store critical data by encryption in the untrusted cloud server but allows us search the encrypted data with the keyword. The server will not know the keyword and the data content but it can retrieval the correct data to us. However, a database with SSE is not enough practical because the data is not invariable. In general, we modify the data frequently even if it stores in the remote server. The server must can update the encrypted data without de
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Cheng-Wei, and 劉正偉. "Dynamic and Efficient Provable Data Possession for Electronic Health Record System &; Symmetric Searchable Encryption Implementation." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/35316429617917002288.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學與工程研究所<br>101<br>We propose a data integrity check scheme for electronic health record system. In our scheme, the patient can check the integrity of his health records when he finished uploading his health records. Obviously, our scheme is based on HMAC, so the computing time of the proof and the verification in our scheme is short. Our scheme also allows the patient to modify his health records on the server. In the end, we design a testing EHR system which allows the patient to check the correctness of his health records. We consider that the user may outsource his fi
APA, Harvard, Vancouver, ISO, and other styles
6

Shah, Akash. "Efficient and Secure Search over Encrypted Data." Thesis, 2019. https://etd.iisc.ac.in/handle/2005/4691.

Full text
Abstract:
Due to a variety of crucial bene fits, enterprises outsource their data to cloud resident storage. The outsourced data needs to be stored in encrypted form on remote untrusted servers to preserve privacy. However, if the client has to retrieve the entire data and decrypt it in order to get results for a search query then that will defeat the purpose of outsourcing. A solution to this problem is Searchable Encryption that provides a reasonable trade-off between security and effciency. Our first contribution is in the context of Dynamic Searchable Symmetric Encryption (DSSE). DSSE schemes
APA, Harvard, Vancouver, ISO, and other styles
7

Chang, Li-Tzu, and 張儷子. "Efficient Conjunctive Keyword-Based Symmetric Searchable Encryption." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/rp5p8u.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學與工程學系所<br>99<br>In the era of cloud computing, private information in the open network server can be accessed anywhere and anytime. As a result, the protection of personal private informa-tion becomes very important. Keyword-searchable encryption has been proposed to protect private information stored in servers while allowing clients to retrieve needed information based on keyword searching. In this thesis, we propose an efficient key-word-searchable encryption scheme. The proposed scheme with conjunctive keyword search is secure against adaptive chosen keyword attacks. Mo
APA, Harvard, Vancouver, ISO, and other styles
8

Oliveira, Filipe Miguel Santos de. "A Systems Approach to Searchable Encryption." Master's thesis, 2020. http://hdl.handle.net/10362/116774.

Full text
Abstract:
The expansion of cloud services facilitates access to hardware and software resources. The number of clients has been raising and so, the amount of data in the cloud provider’s servers. Lots of this data have personal pieces of information that must be protected to guarantee privacy for data owners. Searchable encryption (SE) and symmetric searchable encryption (SSE) provide an effi cient way to protect data and enable searching operations when stored in cloud provider’s servers. Although all the work in this area some details are left outside the scope or for future consideration. Is ne
APA, Harvard, Vancouver, ISO, and other styles
9

Jheng, Ren-Jen, and 鄭仁傑. "Research and Implementation of Unlinkable Searchable Symmetric Encryption Schemes for Cloud Storage." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/41868079914619377925.

Full text
Abstract:
碩士<br>樹德科技大學<br>資訊工程系碩士班<br>101<br>The cloud storage service provides users a very convenient and omnipresent way to store and access data. Behind the convenient service, however, there exist many security issues. Services hardware equipment is not a user can control or during the transfer of files may be intercepted. In order to protect data, many users will encrypt their files in advance before uploading them to the cloud storage. But the original search method has been unable to effectively search the cipher text. Therefore, how to achieve an efficient and secure search on cipher text becom
APA, Harvard, Vancouver, ISO, and other styles
10

Borges, Guilherme Rosas. "Practical Isolated Searchable Encryption in a Trusted Computing Environment." Master's thesis, 2018. http://hdl.handle.net/10362/59506.

Full text
Abstract:
Cloud computing has become a standard computational paradigm due its numerous advantages, including high availability, elasticity, and ubiquity. Both individual users and companies are adopting more of its services, but not without loss of privacy and control. Outsourcing data and computations to a remote server implies trusting its owners, a problem many end-users are aware. Recent news have proven data stored on Cloud servers is susceptible to leaks from the provider, third-party attackers, or even from government surveillance programs, exposing users’ private data. Different approach
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Dynamic Searchable Symmetric Encryption"

1

Krähenbühl, Cyrill, and Adrian Perrig. "Searchable Symmetric Encryption." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_14.

Full text
Abstract:
AbstractSearchable symmetric encryption allows operating on encrypted data, particularly keyword-based search on documents and range-based search on spatial data. Various methods can be used in Searchable symmetric encryption, such as order-preserving or fully homomorphic encryption, for different levels of information leakage. New schemes with more efficient search operations and reduced access and search pattern leakage that support novel settings, such as dynamic data sets and multiple users, have been proposed in the last few years. Especially with the emergence of cloud storage, encryptin
APA, Harvard, Vancouver, ISO, and other styles
2

Minaud, Brice, and Michael Reichle. "Dynamic Local Searchable Symmetric Encryption." In Advances in Cryptology – CRYPTO 2022. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-15985-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kamara, Seny, and Charalampos Papamanthou. "Parallel and Dynamic Searchable Symmetric Encryption." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39884-1_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gajek, Sebastian. "Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption." In Topics in Cryptology - CT-RSA 2016. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29485-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kurosawa, Kaoru, Keisuke Sasaki, Kiyohiko Ohta, and Kazuki Yoneyama. "UC-Secure Dynamic Searchable Symmetric Encryption Scheme." In Advances in Information and Computer Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44524-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chung-Nguyen, Huy-Hoang, Viet-An Pham, Dinh-Hieu Hoang, and Minh-Triet Tran. "Keyword-Search Interval-Query Dynamic Symmetric Searchable Encryption." In Future Data and Security Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35653-8_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Qiao, Yu Guo, Hejiao Huang, and Xiaohua Jia. "Multi-user Forward Secure Dynamic Searchable Symmetric Encryption." In Network and System Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02744-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Jinyang, Zhenfu Cao, Jiachen Shen, and Xiaolei Dong. "MCVDSSE: Secure Multi-client Verifiable Dynamic Symmetric Searchable Encryption." In Science of Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45933-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weener, Jeroen, Florian Hahn, and Andreas Peter. "Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards." In Lecture Notes in Computer Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10684-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zuo, Cong, Shi-Feng Sun, Joseph K. Liu, Jun Shao, and Josef Pieprzyk. "Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29962-0_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Dynamic Searchable Symmetric Encryption"

1

Son, Masaharu, Takeshi Nakai, and Koutarou Suzuki. "Search Result Verifiability in Multi-User Dynamic Searchable Symmetric Encryption." In 2024 11th International Conference on Advanced Informatics: Concept, Theory and Application (ICAICTA). IEEE, 2024. http://dx.doi.org/10.1109/icaicta63815.2024.10763128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Deng, Qinghua, Lanxiang Chen, Yizhao Zhu, and Yi Mu. "Volume Hiding Conjunctive Searchable Symmetric Encryption over Cloud." In 2024 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2024. https://doi.org/10.1109/cyberc62439.2024.00040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Zhiqiang, Yue Zhao, Fei Teng, Jie Hu, Bo Tian, and Hao Zhang. "Dynamic Searchable Symmetric Encrypted Knowledge Graph." In 2024 16th International Conference on Communication Software and Networks (ICCSN). IEEE, 2024. https://doi.org/10.1109/iccsn63464.2024.10793303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mieno, Takehiko, Hiroyuki Okazaki, Kenichi Arai, Yuichi Futa, and Hiroaki Yamamoto. "Formal Security Verification for Searchable Symmetric Encryption Using ProVerif." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Watanabe, Dai, and Masayuki Yoshino. "Practical Key Management for Searchable Symmetric Encryption Using Fuzzy Extractor." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Yijing, Dejiang Su, Yun Zhao, Haolin Wang, Ziwen Cai, and Yuxin Lu. "Conjunctive Dynamic Searchable Encryption Scheme for Smart Grid Data in the Cloud." In 2024 8th International Conference on Communication and Information Systems (ICCIS). IEEE, 2024. https://doi.org/10.1109/iccis63642.2024.10779412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kamara, Seny, Charalampos Papamanthou, and Tom Roeder. "Dynamic searchable symmetric encryption." In the 2012 ACM conference. ACM Press, 2012. http://dx.doi.org/10.1145/2382196.2382298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shibata, Toshiya, and Kazuki Yoneyama. "Universally Composable Forward Secure Dynamic Searchable Symmetric Encryption." In ASIA CCS '21: ACM Asia Conference on Computer and Communications Security. ACM, 2021. http://dx.doi.org/10.1145/3457338.3458290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Salmani, Khosro, and Ken Barker. "Dynamic Searchable Symmetric Encryption with Full Forward Privacy." In 2020 IEEE 5th International Conference on Signal and Image Processing (ICSIP). IEEE, 2020. http://dx.doi.org/10.1109/icsip49896.2020.9339338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, Chia-Feng, Yen-Wu Ti, Sy-Yen Kuo, and Chia-Mu Yu. "Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding." In 2019 International Conference on Intelligent Computing and its Emerging Applications (ICEA). IEEE, 2019. http://dx.doi.org/10.1109/icea.2019.8858302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!