A certificateless authenticated searchable encryption with dynamic multi-receiver for cloud storage

VB Chenam, ST Ali - Computer Communications, 2023 - Elsevier
The searchable encryption schemes (PEKS, IBEKS, and CLPEKS) based on public-key
cryptography (ie, PKI-based, Identity-based, and Certificateless) enable the data users to …

BACASE-SH: Blockchain-based authenticated certificate-less asymmetric searchable encryption for smart healthcare

A Arabnouri, A Shafieinejad - Peer-to-Peer Networking and Applications, 2024 - Springer
Nowadays, smart healthcare and Electronic Health Record (EHR) play a significant role in
simplifying the experience of medical treatment and cuts down the trivial work of …

Certificateless Searchable Public Key Encryption with Trapdoor Indistinguishability for IoV

M Ma, B Chen, D Tang, M Deng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the development of the Internet of Vehicles (IoV), data sharing as a key service for most
IoV applications has emerged as an effective way to break down data silos and unlock the …

Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System.

Y Sun, X Du, S Niu, X Yang - CMES-Computer Modeling in …, 2024 - search.ebscohost.com
Traditional email systems can only achieve one-way communication, which means only the
receiver is allowed to search for emails on the email server. In this paper, we propose a …

Secure-channel free certificateless searchable public key authenticated encryption with keyword search

P Yang, H Li, J Huang, H Zhang, MH Au… - … Conference on Provable …, 2022 - Springer
Abstract Public-key Authenticated Encryption with Keyword Search (PAEKS) is a
cryptographic primitive that can resist inside keyword guessing attack (KGA). However, most …

A Fast and Accurate Non-interactive Privacy-Preserving Neural Network Inference Framework

H Tao, C Xu, P Zhang - International Conference on Testbeds and …, 2023 - Springer
With the remarkable successes of machine learning, it is becoming increasingly popular and
widespread. Machine learning as a Service (MLaaS) provided by cloud services is widely …

CLEAN: Cloud-enabled Scalable Blockchain Outsourcing System Using Dynamic Programming

W Chan, Y Wei, P Jiang, L Xu, L Zhu, J Yu - Proceedings of the 6th ACM …, 2024 - dl.acm.org
Blockchain technology has garnered significant attention in academic and industrial
domains due to its ability to establish a secure and trustworthy environment. As blockchain …

A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability

MR Senouci, I Benkhaddra, A Senouci, F Li - Telecommunication Systems, 2024 - Springer
Nowadays, users often opt to encrypt their sensitive data before outsourcing it to the cloud.
While this encryption ensures data privacy, it compromises the search functionality. Public …

Operating system network security enhancement scheme based on trusted storage

L Qi, X Lv, L Sun, T Yao, J Yu… - … and Converged Networks, 2023 - ieeexplore.ieee.org
Data storage security has become the core of many network security issues. In order to
achieve trusted storage and trusted measurement of network community data, this paper …