B Qin, Y Chen, Q Huang, X Liu, D Zheng - Information Sciences, 2020 - Elsevier
… for a specific file in a large number of encryptedfiles. For plaintext information, traditional keywordsearch technique can be used to find the desired data. But, it does not apply to …
C Ge, W Susilo, Z Liu, J Xia… - … and Secure …, 2020 - ieeexplore.ieee.org
… encrypteddata is uploaded in the cloud, authorized users face two basic operations: data searching and data … attribute-based encryption just ensures the confidentiality of data. Hence, it …
… world limits its core idea of extensive data privacy, native interoperability, risk-free … enterprise applications is a keywordsearch engine where the integrity of user datafiles and …
K Zhang, J Long, X Wang, HN Dai… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… Therefore, lightweight and efficient data sharing and searching schemes suitable for IoT … -keywordsearching for data users. Meanwhile, we extend the LSABE scheme to multiauthority …
… The distribution of healthcare data to authorized users is the critical requirement of efficient healthcare. More importantly, blockchain provides a peer-to-peer and decentralized network …
… the search process is performed using index encrypted by the master key msk. An authorized SU can generate search queries using msk to obtain search results and decrypt the search …
… the SRE scheme derived from SPE is not secure. Recall that, in the IND-REV-CPA game of SRE the adversary is allowed to ask for a number of key revocation queries on R with the …
… scheme, but we will focus only those CP-ABE based searchable encryption schemes which have multi-authority support to manage a diverse set of users. The storage cost is computed …
S Liu, J Yu, Y Xiao, Z Wan, S Wang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… the massive encrypteddata but also performs search and … authority ABE scheme. Zheng et al. [31] proposed a verifiable attribute-based keywordsearch scheme over out-encrypteddata …