An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
DOI10.1007/S00500-018-3224-8zbMATH Open1402.94074DBLPjournals/soco/WuCZH18OpenAlexW2804381801WikidataQ57668116 ScholiaQ57668116MaRDI QIDQ1626271FDOQ1626271
Authors: Biwen Chen, Sherali Zeadally, Debiao He, Libing Wu
Publication date: 27 November 2018
Published in: Soft Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00500-018-3224-8
Recommendations
- Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System
- An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
- Multi-user keyword search scheme for secure data sharing with fine-grained access control
- Certificateless conjunctive keyword search on encrypted data in cloud storage
- A query privacy-enhanced and secure search scheme over encrypted data in cloud computing
privacyfile-injection attackinsider keyword guessing attacksearchable public key encryptionsecure cloud storage
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- New directions in cryptography
- Advances in Cryptology - EUROCRYPT 2004
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Secure deduplication storage systems supporting keyword search
- On security against the server in designated tester public key encryption with keyword search
- A new general framework for secure public key encryption with keyword search
- Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- Fine-grained searchable encryption in multi-user setting
- An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing
- Trapdoor privacy in asymmetric searchable encryption schemes
- Perfect keyword privacy in PEKS systems
Cited In (12)
- Searchable encryption scheme of cloud storage based on word embedding
- Differential privacy enhanced dynamic searchable symmetric encryption for cloud environments
- An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services
- A secure searchable encryption scheme for cloud using hash-based indexing
- Publicly verifiable searchable symmetric encryption based on efficient cryptographic components
- Efficient multi-keyword searchable encryption based on multi-input inner-product functional encryption
- Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis
- Design of a certificateless designated server based searchable public key encryption scheme
- Verifiable attribute-based multi-keyword search scheme with sensitive information hiding for cloud-assisted e-healthcare sharing systems
- Privacy-preserving multikey computing framework for encrypted data in the cloud
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
- Secure cloud storage model based on threshold public key encryption and erasure codes over exponents
Uses Software
This page was built for publication: An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1626271)