Keysea: Keyword-based search with receiver anonymity in attribute-based searchable encryption

P Chaudhari, ML Das - IEEE Transactions on Services …, 2020 - ieeexplore.ieee.org
In modern digital age, enterprise applications typically outsource user data in pubic cloud
storage with the objective of availing flexibility and scalability features of cloud infrastructure …

ASBKS: Towards attribute set based keyword search over encrypted personal health records

L Xu, X Chen, F Zhang, W Li, HT Wu… - … on Dependable and …, 2020 - ieeexplore.ieee.org
With the growth of public demand for online access to health services, many efforts have
been devoted to personal health records (PHR) in cloud computing. It enables patients to …

A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing

H Yin, Z Qin, J Zhang, H Deng, F Li, K Li - Journal of Parallel and Distributed …, 2020 - Elsevier
With the rapid development of cloud computing, secure search has become a hot research
spot, which is a promising technique that allows a data user to perform privacy-preserving …

[图书][B] Attribute-based encryption and access control

D Huang, Q Dong, Y Zhu - 2020 - taylorfrancis.com
This book covers a broader scope of Attribute-Based Encryption (ABE), from the background
knowledge, to specific constructions, theoretic proofs, and applications. The goal is to …

Delegatable searchable encryption with specified keywords for EHR systems

L Xu, Z Sun, W Li, H Yan - Wireless Networks, 2020 - Springer
With the development of big data and cloud computing, more and more data owners store
their data with encrypted form in the cloud server. To retrieve some data they are interested …

Secure-channel free searchable encryption with multiple keywords: A generic construction, an instantiation, and its implementation

K Emura, K Ito, T Ohigashi - Journal of Computer and System Sciences, 2020 - Elsevier
In public key encryption with keyword search (PEKS), a secure channel is required in order
to send trapdoors to the server, whereas in secure-channel free PEKS (SCF-PEKS), no such …

Attribute-based weighted keyword search scheme supporting multi-search mechanism in fog computing

S Wang, Y Li, H Wang, X Zhang… - 2020 7th IEEE …, 2020 - ieeexplore.ieee.org
With the popularity of intelligent terminal, fog computing as a new generation of internet
technology can integrate the computing power of terminals and improve the effective …

Efficient sse with forward id-privacy and authentication in the multi-data-owner settings

H Wang, G Sui, Y Zhao, K Chen - IEEE Access, 2020 - ieeexplore.ieee.org
Based on Sun et al.'s multi-client symmetric searchable encryption (SSE) scheme (at
ESORICS 2016), and combining Zhao's identity-concealed authenticated encryption (CCS …

Efficient top representative for multi-authorship encrypted cloud data to assist cognitive search

P Shanthi, A Umamakeswari - Journal of Intelligent & Fuzzy …, 2020 - content.iospress.com
Cloud computing is gaining ground in the digital and business world. It delivers storage
service for user access using Internet as a medium. Besides the numerous benefits of cloud …

Privacy-preserving disease detection techniques in e-healthcare systems

G Wang - 2020 - dr.ntu.edu.sg
With the increasing popularity of pervasive devices such as smartphones, Body Sensor
Network (BSN), Internet-of-Things devices and cloud computing, mobile e-healthcare has …