Enabling cloud storage auditing with key-exposure resilience under continual key-leakage

C Hu, Y Xu, P Liu, J Yu, S Guo, M Zhao - Information Sciences, 2020 - Elsevier
Cloud storage auditing is a service that is usually provided to enable clients to verify the
integrity of their data stored in the cloud. However, clients risk exposing their secret key. To …

A searchable asymmetric encryption scheme with support for boolean queries for cloud applications

M Zeng, K Zhang, H Qian, X Chen… - The Computer …, 2019 - academic.oup.com
Cloud computing is a new promising technology paradigm that can provide clients from the
whole network with scalable storage resources and on-demand high-quality services …

Efficient and verifiable keyword search over public-key ciphertexts based on blockchain

M Han, P Xu - Journal of Information Security and Applications, 2025 - Elsevier
Public-key encryption with keyword search (PEKS) is a powerful cryptographic primitive that
enables a receiver to search keywords over ciphertexts hosted on an honest-but-curious …

Encryption scheme of verifiable search based on blockchain in cloud environment

B He, T Feng - Cryptography, 2023 - mdpi.com
While transferring data to cloud servers frees users from having to manage it, it eventually
raises new problems, such as data privacy. The concept of searchable encryption has drawn …

Public-key encryption with keyword search via obfuscation

C Hu, P Liu, R Yang, Y Xu - IEEE Access, 2019 - ieeexplore.ieee.org
Public-key encryption with keyword search (PEKS) enables users to search on encrypted
data, which is applicable to the scenario of sharing data in the cloud storage. In this paper …