Provable secure lightweight attribute‐based keyword search for cloud‐based Internet of Things networks

M Ali, MR Sadeghi - Transactions on Emerging …, 2021 - Wiley Online Library
As more data from Internet of Things (IoT) devices is outsourced to cloud service providers,
the need for secure and efficient fine‐grained access control and data retrieving …

Certificateless deniable authenticated encryption for location-based privacy protection

G Chen, J Zhao, Y Jin, Q Zhu, C Jin, J Shan… - IEEE Access, 2019 - ieeexplore.ieee.org
Deniable authenticated encryption (DAE) is a cryptographic primitive that supports data
confidentiality with deniable authentication in an efficient manner. The DAE plays a …

Efficient Continuous Key Agreement With Reduced Bandwidth From a Decomposable KEM

J Lee, J Kwon, JS Shin - IEEE Access, 2023 - ieeexplore.ieee.org
Continuous Key Agreement (CKA) is a two-party protocol used in double-ratchet protocols
such as signal. It enables continuous and synchronous key distribution that generates a …

K-indistinguishable data access for encrypted key-value stores

C Zhang, Q Xie, Y Miao, X Jia - 2022 IEEE 42nd International …, 2022 - ieeexplore.ieee.org
Key-value store is adopted by many applications due to its high performance in processing
big data workloads. Recent research on secure cloud storage has shown that even if the …

A lattice-based searchable encryption scheme with the validity period control of files

E Zhang, Y Hou, G Li - Multimedia Tools and Applications, 2021 - Springer
In recent years, with the dramatic increase in the use of multimedia data, rapid retrieval and
sharing of the multimedia data have become major trends. The validity period control …

LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator

MJ Hossain, C Xu, Y Zhang, X Zhang, W Li - Journal of Ambient …, 2023 - Springer
The deployment of cloud services enables users to outsource their data to cloud servers and
retrieve the target data efficiently. However, the application of quantum computers in clouds …

Attribute-based keyword search from lattices

J Li, M Ma, J Zhang, S Fan, S Li - International Conference on Information …, 2019 - Springer
Attribute-based keyword search (ABKS) is a special case of public key encryption with
keyword search (PEKS) which allows fine-grained control of the search ability and can be …

Development of security performance and comparative analyses process for big data in cloud

MR Shrihari, TN Manjunath, RA Archana… - Emerging Research in …, 2022 - Springer
Big data is accumulate and development with the facilitate of disseminated encoding
structures like Hadoop which handles the new encoding prototype. Big data can handle …

A new construction of public key authenticated encryption with keyword search based on LWE

Z Wang, J Li, X Liu, X Wu, F Li - Telecommunication Systems, 2024 - Springer
A public key encryption with keyword search (PEKS) scheme allows users to share
encrypted data through cloud servers. However, an inside adversary may launch inside …

Cryptanalysis of Two Public Key Encryption Schemes with Multi-keyword Search

J Guo, L Han, G Yang, X Tan, F Wang - Wireless Personal …, 2023 - Springer
Searchable encryption is proposed to retrieve encrypted files without privacy leakage in the
cloud. To improve the search accuracy and search efficiency, most researchers intend to …