A survey of provably secure searchable encryption
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …
and comprehensive overview of the two main SE techniques: searchable symmetric …
Preserving privacy in speaker and speech characterisation
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
Due to the increasing popularity of cloud computing, more and more data owners are
motivated to outsource their data to cloud servers for great convenience and reduced cost in …
motivated to outsource their data to cloud servers for great convenience and reduced cost in …
Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
Cloud computing is becoming increasingly popular. A large number of data are outsourced
to the cloud by data owners motivated to access the large-scale computing resources and …
to the cloud by data owners motivated to access the large-scale computing resources and …
Practical dynamic searchable encryption with small leakage
Abstract Dynamic Searchable Symmetric Encryption (DSSE) enables a client to encrypt his
document collection in a way that it is still searchable and efficiently updatable. However, all …
document collection in a way that it is still searchable and efficiently updatable. However, all …
Generic attacks on secure outsourced databases
Recently, various protocols have been proposed for securely outsourcing database storage
to a third party server, ranging from systems with" full-fledged" security based on strong …
to a third party server, ranging from systems with" full-fledged" security based on strong …
Privacy-preserving multi-keyword ranked search over encrypted cloud data
With the advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to the commercial public cloud for great flexibility …
data management systems from local sites to the commercial public cloud for great flexibility …
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
It is common nowadays for data owners to outsource their data to the cloud. Since the cloud
cannot be fully trusted, the outsourced data should be encrypted. This however brings a …
cannot be fully trusted, the outsourced data should be encrypted. This however brings a …
Functional encryption: Definitions and challenges
We initiate the formal study of functional encryption by giving precise definitions of the
concept and its security. Roughly speaking, functional encryption supports restricted secret …
concept and its security. Roughly speaking, functional encryption supports restricted secret …
Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud
Enabling keyword search directly over encrypted data is a desirable technique for effective
utilization of encrypted data outsourced to the cloud. Existing solutions provide multi …
utilization of encrypted data outsourced to the cloud. Existing solutions provide multi …