Verifiable and forward private conjunctive keyword search from DIA tree

L Sardar, S Ruj - Cryptology ePrint Archive, 2022 - eprint.iacr.org
verifiable conjunctive search DSE scheme Blasu that converts any forward private DSE scheme
conjunctive without … and verifiable [23] but not conjunctive, verifiable, and conjunctive but …

[HTML][HTML] A Certificateless Verifiable Bilinear Pair-Free Conjunctive Keyword Search Encryption Scheme for IoMT

W Long, J Zeng, Y Wu, Y Gao, H Zhang - Electronics, 2024 - mdpi.com
… , no SE scheme can provide result verification, can provide a conjunctive keyword search, is
secure channel-… SE schemes support result verification and conjunctive keyword searches. …

Attribute Based Conjunctive Keywords Search with Verifiability and Fair Payment Using Blockchain

D Zhang, S Wang, Q Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
… we propose an attribute based conjunctive keywords search (ABCKS) scheme that enabled
… , “Vcse: Verifiable conjunctive keywords search over encrypted data without secure-channel,…

Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems

P Yang, H Li, J Huang, H Zhang, MHA Au… - Future Generation …, 2023 - Elsevier
… Once the cloud server has verified the trapdoor the user … multi-keyword search without
relying on a secure channel. … to providing support for conjunctive keyword search. Even if the …

A lattice-based searchable encryption scheme with the validity period control of files

E Zhang, Y Hou, G Li - Multimedia Tools and Applications, 2021 - Springer
… life cycle of the files over encrypted data, instead of manually … to support conjunctive subset
keyword search, aiming at the … and return search results, thus removing the secure channel

Searchable encryption taxonomy: Survey

MH Noorallahzadeh, R Alimoradi… - Journal of Applied …, 2023 - Taylor & Francis
… from the cloud must be verified to examine data integrity. Access … the establishment of a
secure channel. The decryption key must … that your scheme supports only conjunctive searching. …

Cloud-assisted privacy protection for data retrieval against keyword guessing attacks

Z Chen, Y Zhang, G Han, J He, R Guo… - Machine Learning for …, 2020 - Springer
… issue conjunctive keyword search. This SA-PEMKS scheme is not only efficient in searching,
… This protocol provides an irreplaceable verifiable certificate for KS and each user. In the first …

Privacy Preservation Using Top K Multi-Keyword Synonym Fuzzy Search Scheme

M Sekar, K Kandasamy - Inventive Communication and Computational …, 2020 - Springer
… employ techniques to search through encrypted data. There … Verifiable Results: Since the
cloud is not a trusted entity, the … , the server may not complete its search process and may …

Verifiable Attribute-based Keyword Search Scheme with Privacy Preservation

L Xueyan, L Tingting, Y Xiaotao - 电子与信息学报, 2021 - jeit.ac.cn
… VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic … VCSE:
Verifiable conjunctive keywords search over encrypted data without secure-channel[J]. Peer-to-…

Verifiable Attribute-based Keyword Search Scheme with Privacy Preservation

X LIU, T LU, X YANG - 电子与信息学报, 2021 - jeit.ac.cn
… VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic … VCSE:
Verifiable conjunctive keywords search over encrypted data without secure-channel[J]. Peer-to-…