Effective error-tolerant keyword search for secure cloud computing
From MaRDI portal
Recommendations
- Fuzzy keyword search and access control over ciphertexts in cloud computing
- Fuzzy search over encrypted data supporting word frequencies and user preferences in cloud storage
- An improved multi-keyword fuzzy search scheme based on BloomFilter over encrypted text
- Efficient Fuzzy Search on Encrypted Data
- Multi-user keyword search scheme for secure data sharing with fine-grained access control
Cites work
- Advances in Cryptology - EUROCRYPT 2004
- Computing arbitrary functions of encrypted data
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Oblivious RAM Revisited
- Privacy Preserving Keyword Searches on Remote Encrypted Data
- Public Key Encryption That Allows PIR Queries
- Software protection and simulation on oblivious RAMs
This page was built for publication: Effective error-tolerant keyword search for secure cloud computing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q458133)