In this paper, we present an efficient lattice-based public key searchable encryption with fine-grained access control for edge computing. Our scheme achieves post-quantum security and highly flexible access control policies for multi-user applications, by utilizing the learning with errors (LWE) ...
Accordingly, we propose a scan-free verifiable public-key searchable encryption scheme with an efficient user update function in a distributed system (i.e., in a multi-owner multi-user model). First, owners self-select secret keys to encrypt keywords. A master secret key is designed to ...
Searchable encryption is a cryptographic technique enabling efficient searching within a set of encrypted files, while preventing the ability to decrypt them. There are two main types of searchable encryption: symmetric searchable encryption and public key encryption with keyword search. Many existing publ...
Expressive and Secure Searchable Encryptionin the Public Key SettingZhiquan Lv 1,3 , Cheng Hong 1 , Min Zhang 1,2 , and Dengguo Feng 11Trusted Computing and Information Assurance Laboratory, Institute of Software,Chinese Academy of Sciences, Beijing, China2State Key Laboratory of Computer Science...
Hu, C. and Liu, P.: An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its Ex- tensions. Journal of Computers, Vol 7, No 3. pp. 716-723. (2012)Chengyu Hu,Pengtao Liu.An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its ...
In this article, we have tried to help reviewing the public key searchable encryption and categorizing these designs. 展开全部 机器翻译 参考文献(71) 被引用(3) 社区问答 参考文献 (71) 发布时间 · 被引用数 · 默认排序 A general transformation from KP-ABE to searchable encryption Fang Han...
We study the problem of a public key encryption with conjunctive keyword search (PECK). The keyword searchable encryption enables a user to outsource his data to the storage of an untrusted server and to have the ability to selectively search his data wi
This scheme uses a DH shared key and is proven to resist KGAs. In the Internet of Things (IoT) environment, Wu et al. [24] proposed a certificateless searchable public key authentication encryption scheme, which can resist KGAs at the same time and also has a higher efficiency. Ma et al...
In general, searchable encryption mainly contains symmetric searchable encryption (SSE) and public key encryption with keyword search (PEKS). In this paper, we mainly discuss the PEKS schemes. In a PEKS scheme, when a data owner stores his data to the server, he can encrypt the sensitive ...
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks Inform Sci (2017) BakerJ. et al. Telemedicine technology: a review of services, equipment, and other aspects Curr Allergy Asthma Rep (2018) MatusitzJ. et al. Telemedicine: Its effects on health ...