Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems

P Yang, H Li, J Huang, H Zhang, MHA Au… - Future Generation …, 2023 - Elsevier
A significant amount of electronic health records (EHRs) have been kept in the cloud due to
the quick development of healthcare information systems. However, storing EHRs in the …

Privacy-preserving and dynamic multi-attribute conjunctive keyword search over encrypted cloud data

L Zhang, Y Zhang, H Ma - IEEE Access, 2018 - ieeexplore.ieee.org
With the increasing popularity of cloud computing, a growing data owners are motivated to
outsource their huge data to cloud servers in order to facilitate access and save data …

Efficient and Secure Cross‐Domain Sharing of Blockchain Electronic Medical Records Based on Edge Computing

Y Cheng, B Gong, ZJ Jia, YY Yang… - Security and …, 2021 - Wiley Online Library
In this article, we analysed the problems of electronic medical records (EMRs) and found
that the EMRs generated by different hospitals for the same patient are mutually …

An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction

Q Zhang, Z Ge, Y Hu, J Bai, Y Huang - Multimedia Tools and Applications, 2020 - Springer
In order to satisfy the requirements of retrieval time-efficiency and security for encrypted
speech data retrieval in the cloud environment, and to improve the impact of noise on the …

Secure-channel free certificateless searchable public key authenticated encryption with keyword search

P Yang, H Li, J Huang, H Zhang, MH Au… - … Conference on Provable …, 2022 - Springer
Abstract Public-key Authenticated Encryption with Keyword Search (PAEKS) is a
cryptographic primitive that can resist inside keyword guessing attack (KGA). However, most …

Research and development of blockchain security

Z Cai, C Du, Y Gan, J Zhang… - International Journal of …, 2018 - ijpe-online.com
Blockchain is a distributed data structure that integrates security, reliability, and
centralization. It is the central support technology of the emerging digital encryption …

Research on the ranked searchable encryption scheme based on an access Tree in IoTs

YY Yang, B Gong, ZJ Jia, YG Cheng… - … and Mobile Computing, 2021 - Wiley Online Library
With the continuous development of the Internet of things (IoTs), data security and privacy
protection in the IoTs are becoming increasingly important. Aiming at the hugeness …

[PDF][PDF] 支持关键词任意连接搜索的属性加密方案

宋衍, **臻, 陈栋, 赵进华 - 通信学报, 2016 - infocomm-journal.com
构建一种基于素数阶双线性群的可搜索加密方案. 基于属性加密, 实现每个关键词密文能够被多
个用户私钥搜索, 显著降低细粒度访问控制带来的网络带宽和发送节点的处理开销 …

A novel storage and search scheme in cloud computing

J Fang, J He, MS Pathan, M Gao - 2016 12th international …, 2016 - ieeexplore.ieee.org
The emerging field of cloud computing is still evolving with the immense momentum all over
the world. Due to its super-large scale and unprecedented computational capabilities, cloud …

公钥可搜索加密体制综述

秦志光, 徐骏, 聂旭云, 熊虎 - Journal of Cyber Security, 2017 - jcs.iie.ac.cn
伴随着云计算技术的广泛应用, 外包到云服务器存储的数据通常采用密文方式进行存储以确保
数据安全和用户隐私. 可搜索加密体制允许用户对密文数据通过关键词进行检索 …