|
|
|
Yiming Zhu, Dehua Zhou, Yuan Li, Beibei Song and Chuansheng Wang
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes. Keyword frequency analysis is a powerful tool f...
ver más
|
|
|
|
|
|
|
Vitalii Yesin, Mikolaj Karpinski, Maryna Yesina, Vladyslav Vilihura, Ruslan Kozak and Ruslan Shevchuk
The growing popularity of data outsourcing to third-party cloud servers has a downside, related to the serious concerns of data owners about their security due to possible leakage. The desire to reduce the risk of loss of data confidentiality has become ...
ver más
|
|
|
|
|
|
|
Yongbo Jiang, Juncheng Lu and Tao Feng
Searchable encryption is a keyword-based ciphertext retrieval scheme, which can selectively retrieve encrypted documents on encrypted cloud data. Most existing searchable encryption schemes focus only on exact keyword searches and cannot return data of i...
ver más
|
|
|
|
|
|
|
Hyundo Yoon, Soojung Moon, Youngki Kim, Changhee Hahn, Wonjun Lee and Junbeom Hur
Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries. Pr...
ver más
|
|
|
|
|
|
|
Chen Guo, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li and Ting Wu
With the advent of cloud computing, more and more users begin to outsource encrypted files to cloud servers to provide convenient access and obtain security guarantees. Searchable encryption (SE) allows a user to search the encrypted files without leakin...
ver más
|
|
|
|
|
|
|
Dandan Liu, Jian Shen, Zhihua Xia and Xingming Sun
Content-based image retrieval (CBIR) has been widely used in many applications. Large storage and computation overheads have made the outsourcing of CBIR services attractive. However, the privacy issues brought by outsourcing have become a big problem. I...
ver más
|
|
|
|
|
|
|
Mikhail Strizhov, Zachary Osman and Indrajit Ray
Existing Searchable Encryption (SE) solutions are able to handle simple Boolean search queries, such as single or multi-keyword queries, but cannot handle substring search queries over encrypted data that also involve identifying the position of the subs...
ver más
|
|
|
|