Weng. Authorized keyword search on encrypted data. In M. Kutylowski and J. Vaidya, editors, Computer Security - ES- ORICS 2014 - 19th European Symposium on Research in Computer Security, Wro- claw, Poland, September 7-11, 2014. Proceedings, Part I, volume 8712 of Lecture Notes in ...
The proliferation of a new breed of data management applications that store and process data at remote locations has led to the emergence of search over encrypted data as an important research problem. In a typical setting of the problem, data is stored
We propose a homomorphic search protocol based on quantum homomorphic encryption, in which a client Alice with limited quantum ability can give her encrypted data to a powerful but untrusted quantum server and let the server search for her without decryp
In order to ensure that only authorized users can search and further access the encrypted data, two important capabilities must be supported: keyword search and access control . Recently, rigorous efforts have been made on either keyword search or access control over encrypted data. However, to ...
However, geometric range search on spatial data has not been fully investigated nor supported by existing searchable encryption schemes. In this paper, we design a symmetric-key searchable encryption scheme that can support geometric range queries on encrypted spatial data. One of our major ...
In another embodiment, an indexing structure for a database may be accessed. Positions of items of the indexing structure may be based on corresponding plaintext items. References related to the corresponding plaintext items in the indexing structure may be encrypted and other information in the ...
Private query processing on encrypted databases allows users to obtain data from encrypted databases in such a way that the user's sensitive data will be protected from exposure. Given an encrypted data- base, the users typically submit queries similar to the following examplesJung Hee CheonB...
uploaded for real time processing to generate computing results without the need to store processed data on the cloud.Cloud computing data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings....
Summary: Private query processing on encrypted databases allows users to obtain data from encrypted databases in such a way that the user's sensitive data will be protected from exposure. Given an encrypted database, the users typically submit queries similar to the following examples:How many empl...
Keywords Fuzzy search encryption on cloud cloud computing AES wildcard View PDFReferences [1] D. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proc. of IEEE Symposiumon Security and Privacy’00, 2000. Google Scholar [2] C. Li, J. Lu, and...