To see the other types of publications on this topic, follow the link: Dynamic Searchable Symmetric Encryption.

Journal articles on the topic 'Dynamic Searchable Symmetric Encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Dynamic Searchable Symmetric Encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Du, Ruizhong, Yuqing Zhang, and Mingyue Li. "Database Padding for Dynamic Symmetric Searchable Encryption." Security and Communication Networks 2021 (December 31, 2021): 1–12. http://dx.doi.org/10.1155/2021/9703969.

Full text
Abstract:
Dynamic symmetric searchable encryption (DSSE) that enables the search and update of encrypted databases outsourced to cloud servers has recently received widespread attention for leakage-abuse attacks against DSSE. In this paper, we propose a dynamic database padding method to mitigate the threat of data leakage during the update operation of outsourcing data. First, we introduce an outlier detection technology where bogus files are generated for padding according to the outlier factors, hiding the document information currently matching search keywords. Furthermore, we design a new index str
APA, Harvard, Vancouver, ISO, and other styles
2

Guo, Chen, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li, and Ting Wu. "Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing." Information 9, no. 10 (2018): 242. http://dx.doi.org/10.3390/info9100242.

Full text
Abstract:
With the advent of cloud computing, more and more users begin to outsource encrypted files to cloud servers to provide convenient access and obtain security guarantees. Searchable encryption (SE) allows a user to search the encrypted files without leaking information related to the contents of the files. Searchable symmetric encryption (SSE) is an important branch of SE. Most of the existing SSE schemes considered single-user settings, which cannot meet the requirements for data sharing. In this work, we propose a multi-user searchable symmetric encryption scheme with dynamic updates. This sch
APA, Harvard, Vancouver, ISO, and other styles
3

Kissel, Zachary A., and Jie Wang. "Generic Adaptively Secure Searchable Phrase Encryption." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 4–20. http://dx.doi.org/10.1515/popets-2017-0002.

Full text
Abstract:
Abstract In recent years searchable symmetric encryption has seen a rapid increase in query expressiveness including keyword, phrase, Boolean, and fuzzy queries. With this expressiveness came increasingly complex constructions. Having these facts in mind, we present an efficient and generic searchable symmetric encryption construction for phrase queries. Our construction is straightforward to implement, and is proven secure under adaptively chosen query attacks (CQA2) in the random oracle model with an honest-but-curious adversary. To our knowledge, this is the first encrypted phrase search sy
APA, Harvard, Vancouver, ISO, and other styles
4

Etemad, Mohammad, Alptekin Küpçü, Charalampos Papamanthou, and David Evans. "Efficient Dynamic Searchable Encryption with Forward Privacy." Proceedings on Privacy Enhancing Technologies 2018, no. 1 (2018): 5–20. http://dx.doi.org/10.1515/popets-2018-0002.

Full text
Abstract:
Abstract Searchable symmetric encryption (SSE) enables a client to perform searches over its outsourced encrypted files while preserving privacy of the files and queries. Dynamic schemes, where files can be added or removed, leak more information than static schemes. For dynamic schemes, forward privacy requires that a newly added file cannot be linked to previous searches. We present a new dynamic SSE scheme that achieves forward privacy by replacing the keys revealed to the server on each search. Our scheme is efficient and parallelizable and outperforms the best previous schemes providing f
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Xi, Ye Su, and Jing Qin. "A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security." Security and Communication Networks 2020 (October 20, 2020): 1–13. http://dx.doi.org/10.1155/2020/8893016.

Full text
Abstract:
Dynamic Searchable Symmetric Encryption for Multiuser (M-DSSE) is an advanced form of symmetric encryption. It extends the traditional symmetric encryption to support the operations of adding and deleting the encrypted data and allow an authenticated group of data users to retrieve their respective desired encrypted data in the dynamic database. However, M-DSSE would suffer from the privacy concerns regarding forward and backward security. The former allows an attacker to identify the keywords contained in the added data by lunching file-injection attacks, while the latter allows to utilize th
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Jiafan, and Sherman S. M. Chow. "Forward and Backward-Secure Range-Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (2021): 28–48. http://dx.doi.org/10.2478/popets-2022-0003.

Full text
Abstract:
Abstract Dynamic searchable symmetric encryption (DSSE) allows a client to query or update an outsourced encrypted database. Range queries are commonly needed. Previous range-searchable schemes either do not support updates natively (SIGMOD’16) or use file indexes of many long bit-vectors for distinct keywords, which only support toggling updates via homomorphically flipping the presence bit. (ESORICS’18). We propose a generic upgrade of any (inverted-index) DSSE to support range queries (a.k.a. range DSSE), without homomorphic encryption, and a specific instantiation with a new trade-off redu
APA, Harvard, Vancouver, ISO, and other styles
7

Cui, Shujie, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, and Giovanni Russello. "Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage." ACM Transactions on Privacy and Security 24, no. 3 (2021): 1–35. http://dx.doi.org/10.1145/3446920.

Full text
Abstract:
Searchable Encryption (SE) is a technique that allows Cloud Service Providers to search over encrypted datasets without learning the content of queries and records. In recent years, many SE schemes have been proposed to protect outsourced data. However, most of them leak sensitive information, from which attackers could still infer the content of queries and records by mounting leakage-based inference attacks, such as the count attack and file-injection attack . In this work, first we define the leakage in searchable encrypted databases and analyse how the leakage is leveraged in existing leak
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Yu, Yin Li, and Yifan Wang. "Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search." Security and Communication Networks 2020 (July 16, 2020): 1–16. http://dx.doi.org/10.1155/2020/7298518.

Full text
Abstract:
Searchable symmetric encryption that supports dynamic multikeyword ranked search (SSE-DMKRS) has been intensively studied during recent years. Such a scheme allows data users to dynamically update documents and retrieve the most wanted documents efficiently. Previous schemes suffer from high computational costs since the time and space complexities of these schemes are linear with the size of the dictionary generated from the dataset. In this paper, by utilizing a shallow neural network model called “Word2vec” together with a balanced binary tree structure, we propose a highly efficient SSE-DM
APA, Harvard, Vancouver, ISO, and other styles
9

Bilbul, Salim, and Ayad Abdulsada. "Backward Private Searchable Symmetric Encryption with Improved Locality." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (2021): 17–26. http://dx.doi.org/10.37917/ijeee.17.2.3.

Full text
Abstract:
Searchable symmetric encryption (SSE) enables clients to outsource their encrypted documents into a remote server and allows them to search the outsourced data efficiently without violating the privacy of the documents and search queries. Dynamic SSE schemes (DSSE) include performing update queries, where documents can be added or removed at the expense of leaking more information to the server. Two important privacy notions are addressed in DSSE schemes: forward and backward privacy. The first one prevents associating the newly added documents with previously issued search queries. While the
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Ke, Xiaolei Dong, Zhenfu Cao, and Jiachen Shen. "Dynamic searchable symmetric encryption schemes with forward and backward security." IOP Conference Series: Materials Science and Engineering 715 (January 3, 2020): 012062. http://dx.doi.org/10.1088/1757-899x/715/1/012062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

He, Kun, Jing Chen, Qinxi Zhou, Ruiying Du, and Yang Xiang. "Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost." IEEE Transactions on Information Forensics and Security 16 (2021): 1538–49. http://dx.doi.org/10.1109/tifs.2020.3033412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Hiemenz, Benedikt, and Michel Krämer. "Dynamic searchable symmetric encryption for storing geospatial data in the cloud." International Journal of Information Security 18, no. 3 (2018): 333–54. http://dx.doi.org/10.1007/s10207-018-0414-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Du, Leilei, Kenli Li, Qin Liu, Zhiqiang Wu, and Shaobo Zhang. "Dynamic multi-client searchable symmetric encryption with support for boolean queries." Information Sciences 506 (January 2020): 234–57. http://dx.doi.org/10.1016/j.ins.2019.08.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Duan, Gangqiang, and Shuai Li. "Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem." Electronics 12, no. 18 (2023): 3965. http://dx.doi.org/10.3390/electronics12183965.

Full text
Abstract:
With the rapid development of Internet of Things technology and cloud computing technology, all industries need to outsource massive data to third-party clouds for storage in order to reduce storage and computing costs. Verifiable and dynamic searchable symmetric encryption is a very important cloud security technology, which supports the dynamic update of private data and allows users to perform search operations on the cloud server and verify the legitimacy of the returned results. Therefore, how to realize the dynamic search of encrypted cloud data and the effective verification of the resu
APA, Harvard, Vancouver, ISO, and other styles
15

Wang, Wei, Dongli Liu, Peng Xu, Laurence Tianruo Yang, and Kaitai Liang. "Keyword Search Shareable Encryption for Fast and Secure Data Replication." IEEE Transactions on Information Forensics and Security 18 (August 21, 2023): 5537–52. https://doi.org/10.1109/TIFS.2023.3306941.

Full text
Abstract:
It has become a trend for clients to outsource their encrypted databases to remote servers and then leverage the Searchable Encryption technique to perform secure data retrieval. However, the method has yet to be considered a crucial need for replication on searchable encrypted data. It calls for challenging works on Dynamic Searchable Symmetric Encryption (DSSE) since clients must share the search capability of the encrypted data replicas and guarantee forward and backward privacy. We define a new notion called “Keyword Search Shareable Encryption” (KS2E2E) and the corresponding s
APA, Harvard, Vancouver, ISO, and other styles
16

Bulbul, Salim Sabah, Zaid Ameen Abduljabbar, Duaa Fadhel Najem, Vincent Omollo Nyangaresi, Junchao Ma, and Abdulla J. Y. Aldarwish. "Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control." Journal of Sensor and Actuator Networks 13, no. 1 (2024): 12. http://dx.doi.org/10.3390/jsan13010012.

Full text
Abstract:
Untrusted servers are servers or storage entities lacking complete trust from the data owner or users. This characterization implies that the server hosting encrypted data may not enjoy full trust from data owners or users, stemming from apprehensions related to potential security breaches, unauthorized access, or other security risks. The security of searchable encryption has been put into question by several recent attacks. Currently, users can search for encrypted documents on untrusted cloud servers using searchable symmetric encryption (SSE). This study delves deeply into two pivotal conc
APA, Harvard, Vancouver, ISO, and other styles
17

Yoon, Hyundo, Muncheon Yu, Changhee Hahn, Dongyoung Koo, and Junbeom Hur. "Exploiting Hidden Information Leakages in Backward Privacy for Dynamic Searchable Symmetric Encryption." Applied Sciences 14, no. 6 (2024): 2287. http://dx.doi.org/10.3390/app14062287.

Full text
Abstract:
Dynamic searchable symmetric encryption (DSSE) enables searches over encrypted data as well as data dynamics such as flexible data addition and deletion operations. A major security concern in DSSE is how to preserve forward and backward privacy, which are typically achieved by removing the linkability between the newly added data and previous queries, and between the deleted data and future queries, respectively. After information leakage types were formally defined for different levels of backward privacy (i.e., Type-I, II, III), many backward private DSSE schemes have been constructed under
APA, Harvard, Vancouver, ISO, and other styles
18

Guo, Cheng, Xue Chen, Yingmo Jie, Zhangjie Fu, Mingchu Li, and Bin Feng. "Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption." IEEE Transactions on Services Computing 13, no. 6 (2020): 1034–44. http://dx.doi.org/10.1109/tsc.2017.2768045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Ti, Yen-Wu, Chia-Feng Wu, Chia-Mu Yu, and Sy-Yen Kuo. "Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications." IEEE Access 8 (2020): 1715–32. http://dx.doi.org/10.1109/access.2019.2961971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Li, Hongwei, Yi Yang, Yuanshun Dai, Shui Yu, and Yong Xiang. "Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data." IEEE Transactions on Cloud Computing 8, no. 2 (2020): 484–94. http://dx.doi.org/10.1109/tcc.2017.2769645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Liu, Chang, Liehuang Zhu, and Jinjun Chen. "Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud." Journal of Network and Computer Applications 86 (May 2017): 3–14. http://dx.doi.org/10.1016/j.jnca.2016.09.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Sun, Lixue, Chunxiang Xu, and Yuan Zhang. "A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting." Journal of Information Security and Applications 40 (June 2018): 145–55. http://dx.doi.org/10.1016/j.jisa.2018.03.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Zhao, Minghao, Han Jiang, Zhen Li, Qiuliang Xu, Hao Wang, and Shaojing Li. "An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms." International Journal of High Performance Computing and Networking 12, no. 2 (2018): 179. http://dx.doi.org/10.1504/ijhpcn.2018.094368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Li, Shaojing, Hao Wang, Qiuliang Xu, Han Jiang, Zhen Li, and Minghao Zhao. "An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms." International Journal of High Performance Computing and Networking 12, no. 2 (2018): 179. http://dx.doi.org/10.1504/ijhpcn.2018.10015546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Xu, Wanshan, Jianbiao Zhang, Yilin Yuan, Xiao Wang, Yanhui Liu, and Muhammad Irfan Khalid. "Towards efficient verifiable multi-keyword search over encrypted data based on blockchain." PeerJ Computer Science 8 (March 21, 2022): e930. http://dx.doi.org/10.7717/peerj-cs.930.

Full text
Abstract:
Searchable symmetric encryption (SSE) provides an effective way to search encrypted data stored on untrusted servers. When the server is not trusted, it is indispensable to verify the results returned by it. However, the existing SSE schemes either lack fairness in the verification of search results, or do not support the verification of multiple keywords. To address this, we designed a multi-keyword verifiable searchable symmetric encryption scheme based on blockchain, which provides an efficient multi-keyword search and fair verification of search results. We utilized bitmap to build a searc
APA, Harvard, Vancouver, ISO, and other styles
26

Peng, Xu, Susilo Willy, Wang Wei, et al. "ROSE: Robust Searchable Encryption with Forward and Backward Security." IEEE Transactions on Information Forensics and Security 17 (March 2, 2022): 1115–30. https://doi.org/10.1109/TIFS.2022.3155977.

Full text
Abstract:
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a promising technique to delegate update and search queries over an outsourced database to an untrusted server while guaranteeing the privacy of data. Many efforts on DSSE have been devoted to obtaining a good tradeoff between security and performance. However, it appears that all existing DSSE works miss studying on what will happen if the DSSE client issues irrational update queries carelessly, such as duplicate update queries and delete queries to remove non-existent entries (that have been considered by many popul
APA, Harvard, Vancouver, ISO, and other styles
27

Yuan, Dandan, Cong Zuo, Shujie Cui, and Giovanni Russello. "Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward and Backward Privacy." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (2023): 40–58. http://dx.doi.org/10.56553/popets-2023-0040.

Full text
Abstract:
Dynamic searchable symmetric encryption (DSSE) enables the data owner to outsource its database (document sets) to an untrusted server and make searches and updates securely and efficiently. Conjunctive DSSE can process conjunctive queries that return the documents containing multiple keywords. However, a conjunctive search could leak the keyword pair result pattern (KPRP), where attackers can learn which documents contain any two keywords involved in the query. File-injection attack shows that KPRP can be utilized to recover searched keywords. To protect data effectively, DSSE should also ach
APA, Harvard, Vancouver, ISO, and other styles
28

Bulbul, Salim Sabah, and Zaid Ameen Abduljabbar. "Performing Encrypted Cloud Data Keyword Searches Using Blockchain Technology on Smart Devices." Basrah Researches Sciences 50, no. 1 (2024): 17. http://dx.doi.org/10.56714/bjrs.50.1.24.

Full text
Abstract:
Data owners seeking to boost processing power, storage, or bandwidth can take advantage of cloud computing services. However, this shift poses new challenges related to privacy and data security. Searchable Encryption (SE), which combines encryption and search techniques, addresses these issues (violation of data users' privacy) by allowing user data to be encrypted, transmitted to a cloud server, and searched using keywords. Despite its benefits, several recent real-world attacks have raised concerns about the security of searchable encryption. Ensuring forward and backward privacy is likely
APA, Harvard, Vancouver, ISO, and other styles
29

Peng, Tianqi, Bei Gong, and Jiangjiang Zhang. "Towards Privacy Preserving in 6G Networks: Verifiable Searchable Symmetric Encryption Based on Blockchain." Applied Sciences 13, no. 18 (2023): 10151. http://dx.doi.org/10.3390/app131810151.

Full text
Abstract:
The blockchain-based searchable symmetric encryption (SSE) scheme allows the retrieval and verification of outsourced data on cloud servers in sixth generation (6G) networks while ensuring the privacy of data. However, existing schemes are challenging to comprehensively meet the requirements of 6G-based intelligent application systems for low latency, high security, and high reliability. To address these limitations, we present VSSE, a novel blockchain-based SSE scheme designed for 6G-based intelligent application systems. Our scheme constructs a state chain structure to resist file injection
APA, Harvard, Vancouver, ISO, and other styles
30

Amjad, Ghous, Seny Kamara, and Tarik Moataz. "Breach-Resistant Structured Encryption." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (2019): 245–65. http://dx.doi.org/10.2478/popets-2019-0014.

Full text
Abstract:
Abstract Motivated by the problem of data breaches, we formalize a notion of security for dynamic structured encryption (STE) schemes that guarantees security against a snapshot adversary; that is, an adversary that receives a copy of the encrypted structure at various times but does not see the transcripts related to any queries. In particular, we focus on the construction of dynamic encrypted multi-maps which are used to build efficient searchable symmetric encryption schemes, graph encryption schemes and encrypted relational databases. Interestingly, we show that a form of snapshot security
APA, Harvard, Vancouver, ISO, and other styles
31

Zuo, Cong, Shangqi Lai, Shi-Feng Sun, et al. "Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy." Proceedings on Privacy Enhancing Technologies 2025, no. 1 (2025): 440–55. http://dx.doi.org/10.56553/popets-2025-0024.

Full text
Abstract:
Recent developments in the field of Dynamic Searchable Symmetric Encryption (DSSE) with forward and backward privacy have attracted much attention from both research and industrial communities. However, most DSSE schemes with forward and backward privacy schemes only support single keyword queries, which impedes its prevalence in practice. Although some forward and backward private DSSE schemes with expressive queries (e.g., conjunctive queries) have been introduced, their backward privacy either essentially corresponds to single keyword queries or forward privacy is not comprehensive. In addi
APA, Harvard, Vancouver, ISO, and other styles
32

Peng, Tianqi, Bei Gong, Shanshan Tu, et al. "Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT." Sensors 24, no. 23 (2024): 7597. http://dx.doi.org/10.3390/s24237597.

Full text
Abstract:
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced data stored on cloud servers while ensuring data privacy. Forward privacy and backward privacy are necessary security requirements for DSSE. However, most existing schemes either trade the server’s large storage overhead for forward privacy or trade efficiency/overhead for weak backward privacy. These schemes cannot fully meet the security req
APA, Harvard, Vancouver, ISO, and other styles
33

Makhmudov, Teimur, and Vitalii Yesin. "Analysis of data search methods in cryptographically protected databases." Computer Science and Cybersecurity, no. 2 (December 26, 2022): 6–21. http://dx.doi.org/10.26565/2519-2310-2022-2-01.

Full text
Abstract:
The issue of compliance with data security, namely their confidentiality and integrity, generally being resolved through the use of appropriate cryptographic primitives, taking into account the development of computing power (and/or computational complexity of algorithms). But, in connection with the specific method of storage (in the cloud), the question arises of the effectiveness of the search for the necessary information. The problem considered in this paper is that encryption makes it impossible for an attacker to access data without access key, but deprives the legal owner of the data,
APA, Harvard, Vancouver, ISO, and other styles
34

Bulbul, Salim Sabah, Zaid Ameen Abduljabbar, Rana Jassim Mohammed, et al. "A provably lightweight and secure DSSE scheme, with a constant storage cost for a smart device client." PLOS ONE 19, no. 4 (2024): e0301277. http://dx.doi.org/10.1371/journal.pone.0301277.

Full text
Abstract:
Outsourcing data to remote cloud providers is becoming increasingly popular amongst organizations and individuals. A semi-trusted server uses Searchable Symmetric Encryption (SSE) to keep the search information under acceptable leakage levels whilst searching an encrypted database. A dynamic SSE (DSSE) scheme enables the adding and removing of documents by performing update queries, where some information is leaked to the server each time a record is added or removed. The complexity of structures and cryptographic primitives in most existing DSSE schemes makes them inefficient, in terms of sto
APA, Harvard, Vancouver, ISO, and other styles
35

Narayanareddy, Mugireddy Satya, Lekireddy Rajasekharreddy, Isani Swetha, and P. V. Jagadeeswara Prasad. "SYMMETRIC-KEY BASED VERIFICATION OF KEYWORD SEARCH OVER DYNAMIC ENCRYPTED CLOUD DATA." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2736–41. http://dx.doi.org/10.61841/turcomat.v11i3.14517.

Full text
Abstract:
Searchable and Verifiable As a crucial method of cloud security, symmetric encryption enables users to search for encrypted data in the cloud using keywords and validate the accuracy of the results. One of the most prevalent and important requirements for data owners in such schemes is dynamic update for cloud data. To our knowledge, all of the verifiable SSE systems that permit data dynamic update currently in use are based on asymmetric-key cryptography verification, which necessitates time-consuming processes. The sheer volume of cloud data could make the overhead of verification a major bu
APA, Harvard, Vancouver, ISO, and other styles
36

Shenigaram, Vidhya, Ladhwe Shri Megha, Rajasekharaiah Matada Kattigehally, and Swarnaja Mettu. "SYMMETRIC-KEY BASED VERIFICATION OF KEYWORD SEARCH OVER DYNAMIC ENCRYPTED CLOUD DATA." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2696–702. http://dx.doi.org/10.61841/turcomat.v11i3.14483.

Full text
Abstract:
Searchable and Verifiable As a crucial method of cloud security, symmetric encryption enables users to search for encrypted data in the cloud using keywords and validate the accuracy of the results. One of the most prevalent and important requirements for data owners in such schemes is dynamic update for cloud data. To our knowledge, all of the verifiable SSE systems that permit data dynamic update currently in use are based on asymmetric-key cryptography verification, which necessitates time-consuming processes. The sheer volume of cloud data could make the overhead of verification a major bu
APA, Harvard, Vancouver, ISO, and other styles
37

Poh, Geong Sen, Ji-Jian Chin, Wei-Chuen Yau, Kim-Kwang Raymond Choo, and Moesfa Soeheila Mohamad. "Searchable Symmetric Encryption." ACM Computing Surveys 50, no. 3 (2017): 1–37. http://dx.doi.org/10.1145/3064005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Li, Huige, Fangguo Zhang, and Chun-I. Fan. "Deniable Searchable Symmetric Encryption." Information Sciences 402 (September 2017): 233–43. http://dx.doi.org/10.1016/j.ins.2017.03.032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Chase, Melissa, and Emily Shen. "Substring-Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2015, no. 2 (2015): 263–81. http://dx.doi.org/10.1515/popets-2015-0014.

Full text
Abstract:
AbstractIn this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s. First, we formalize an encryption paradigm that we call queryable encryption, which generalizes searchable symmetric encryption (SSE) and structured encryption. Then, we construct a queryable encryption scheme for substring queries. Our construction uses suffix trees and achieves asymptotic efficiency comparable to that of unencr
APA, Harvard, Vancouver, ISO, and other styles
40

Luo, Guangchun, Ningduo Peng, Ke Qin, and Aiguo Chen. "A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods." Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/153791.

Full text
Abstract:
Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with different searchable structures that are generally not compatible with each other, which limits the scope of application and hinders the functional extensions. We prove that asymmetric searchable structu
APA, Harvard, Vancouver, ISO, and other styles
41

OGATA, Wakaha, and Kaoru KUROSAWA. "No-Dictionary Searchable Symmetric Encryption." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A, no. 1 (2019): 114–24. http://dx.doi.org/10.1587/transfun.e102.a.114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

ETEMAD, Mohammad, and Alptekin KÜPÇÜ. "Verifiable dynamic searchable encryption." TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 27, no. 4 (2019): 2606–23. http://dx.doi.org/10.3906/elk-1901-157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Dai, Shuguang, Huige Li, and Fangguo Zhang. "Memory leakage-resilient searchable symmetric encryption." Future Generation Computer Systems 62 (September 2016): 76–84. http://dx.doi.org/10.1016/j.future.2015.11.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Huige, Haibo Tian, Fangguo Zhang, and Jiejie He. "Blockchain-based searchable symmetric encryption scheme." Computers & Electrical Engineering 73 (January 2019): 32–45. http://dx.doi.org/10.1016/j.compeleceng.2018.10.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Poh, Geong Sen, Moesfa Soeheila Mohamad, and Ji-Jian Chin. "Searchable symmetric encryption over multiple servers." Cryptography and Communications 10, no. 1 (2017): 139–58. http://dx.doi.org/10.1007/s12095-017-0232-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Han, Jiujiang, Ziyuan Li, Jian Liu, et al. "Attribute-Based Access Control Meets Blockchain-Enabled Searchable Encryption: A Flexible and Privacy-Preserving Framework for Multi-User Search." Electronics 11, no. 16 (2022): 2536. http://dx.doi.org/10.3390/electronics11162536.

Full text
Abstract:
Searchable encryption enables users to enjoy search services while protecting the security and privacy of their outsourced data. Blockchain-enabled searchable encryption delivers the computing processes that are executed on the server to the decentralized and transparent blockchain system, which eliminates the potential threat of malicious servers invading data. Recently, although some of the blockchain-enabled searchable encryption schemes realized that users can search freely and verify search results, unfortunately, these schemes were inefficient and costly. Motivated by this, we proposed a
APA, Harvard, Vancouver, ISO, and other styles
47

Du, Haorui, Jianhua Chen, Fei Lin, Cong Peng, and Debiao He. "A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing." Security and Communication Networks 2022 (October 15, 2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.

Full text
Abstract:
Cloud computing can provide users with sufficient computing resources, storage, and bandwidth to meet their needs. Data security and privacy protection are among the new threats faced by users. Searchable encryption is the combination of search technology and encryption technology. Searchable encryption can upload the user’s data to the cloud server after special encryption, and can realize the function of retrieving according to keywords. Comparatively to symmetric searchable encryption (SSE), public key searchable encryption (PEKS) simplifies key management greatly. However, most existing pu
APA, Harvard, Vancouver, ISO, and other styles
48

Cao, Suzhen, Junjian Yan, Zixuan Fang, and Caifen Wang. "A Searchable Encryption with Forward/Backward Security and Constant Storage." Applied Sciences 13, no. 4 (2023): 2181. http://dx.doi.org/10.3390/app13042181.

Full text
Abstract:
Dynamic searchable encryption satisfies users’ needs for ciphertext retrieval on semi-trusted servers, while allowing users to update server-side data. However, cloud servers with dynamically updatable data are vulnerable to information abuse and file injection attacks, and current public key-based dynamic searchable encryption algorithms are often complicated in construction and high in computational overhead, which is not efficient for practical applications. In addition, the client’s storage costs grow linearly with the number of keywords in the database, creating a new bottleneck when the
APA, Harvard, Vancouver, ISO, and other styles
49

Choi, Daeseon, Seung-Hyun Kim, and Younho Lee. "Address Permutation for Privacy-Preserving Searchable Symmetric Encryption." ETRI Journal 34, no. 1 (2012): 66–75. http://dx.doi.org/10.4218/etrij.12.0111.0243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

He, Wei, Yu Zhang, and Yin Li. "Fast, Searchable, Symmetric Encryption Scheme Supporting Ranked Search." Symmetry 14, no. 5 (2022): 1029. http://dx.doi.org/10.3390/sym14051029.

Full text
Abstract:
Searchable encryption (SE) is one of the effective techniques for searching encrypted data without decrypting it. This technique can provide a secure indexing mechanism for encrypted data and utilize a secure trapdoor to search for the encrypted data directly, thus realizing a secure ciphertext retrieval function. Existing schemes usually build a secure index directly on the whole dataset and implement the retrieval of encrypted data by implementing a secure search algorithm on the index. However, this approach requires testing many non-relevant documents, which diminishes the query efficiency
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!