A survey of provably secure searchable encryption
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …
and comprehensive overview of the two main SE techniques: searchable symmetric …
Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
Search over encrypted data is a critically important enabling technique in cloud computing,
where encryption-before-outsourcing is a fundamental solution to protecting user data …
where encryption-before-outsourcing is a fundamental solution to protecting user data …
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
Search over encrypted data is a critically important enabling technique in cloud computing,
where encryption-before-outsourcing is a fundamental solution to protecting user data …
where encryption-before-outsourcing is a fundamental solution to protecting user data …
Search pattern leakage in searchable encryption: Attacks and new construction
Searching on remote encrypted data (commonly known as searchable encryption) has
become an important issue in secure data outsourcing, since it allows users to outsource …
become an important issue in secure data outsourcing, since it allows users to outsource …
Searchable encryption: A survey
D Sharma - Information Security Journal: A Global Perspective, 2023 - Taylor & Francis
We explore the field of searchable encryption (SE) and present a comprehensive survey of
relevant literature. Since the existing survey articles are primarily written for the security …
relevant literature. Since the existing survey articles are primarily written for the security …
An efficient non-interactive multi-client searchable encryption with support for boolean queries
Motivated by the recent searchable symmetric encryption protocol of Cash et al., we propose
a new multi-client searchable encryption protocol in this work. By tactfully leveraging the …
a new multi-client searchable encryption protocol in this work. By tactfully leveraging the …
Automatically detecting and describing high level actions within methods
One approach to easing program comprehension is to reduce the amount of code that a
developer has to read. Describing the high level abstract algorithmic actions associated with …
developer has to read. Describing the high level abstract algorithmic actions associated with …
Multi-key searchable encryption
We construct a searchable encryption scheme that enables keyword search over data
encrypted with {\em different} keys. The scheme is practical and was designed to be …
encrypted with {\em different} keys. The scheme is practical and was designed to be …
AKSER: Attribute-based keyword search with efficient revocation in cloud computing
With the advent of cloud computing, it is becoming increasingly popular for data owners to
outsource their data to public cloud servers while allowing indented data users to retrieve …
outsource their data to public cloud servers while allowing indented data users to retrieve …
Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search
H Wang, X Dong, Z Cao - IEEE Transactions on Services …, 2017 - ieeexplore.ieee.org
ABKS has drawn much attention from research and industry in recent years, an ABKS
scheme is an encryption scheme that supports keyword search and access control. Attribute …
scheme is an encryption scheme that supports keyword search and access control. Attribute …