Searchable symmetric encryption: Designs and challenges

GS Poh, JJ Chin, WC Yau, KKR Choo… - ACM Computing …, 2017 - dl.acm.org
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query
encrypted data without the risk of data leakage. Despite the widespread interest, existing …

Identity-based encryption with outsourced equality test in cloud computing

S Ma - Information Sciences, 2016 - Elsevier
We firstly combine the concepts of public key encryption with equality test (PKEET) and
identity-based encryption (IBE) to obtain identity-based encryption with equality test (IBEET) …

Privacy-preserving dynamic symmetric searchable encryption with controllable leakage

S Cui, X Song, MR Asghar, SD Galbraith… - ACM Transactions on …, 2021 - dl.acm.org
Searchable Encryption (SE) is a technique that allows Cloud Service Providers to search
over encrypted datasets without learning the content of queries and records. In recent years …

Searchable encryption: a survey on privacy‐preserving search schemes on encrypted outsourced data

R Handa, CR Krishna… - … and Computation: Practice …, 2019 - Wiley Online Library
Outsourcing confidential data to cloud storage leads to privacy challenges that can be
reduced using encryption. However, with encryption in place, the utilization of the data is …

An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment

C Meshram, CC Lee, SG Meshram, MK Khan - Soft computing, 2019 - Springer
The advancement of the cloud storage technology opens up a wide range of possibilities for
adaptable data sharing. When sharing data to an extensive number of users with fuzzy …

Password-authenticated searchable encryption

L Chen, K Huang, M Manulis, V Sekar - International Journal of Information …, 2021 - Springer
Abstract We introduce Password Authenticated Searchable Encryption (PASE), a novel
searchable encryption scheme where a single human-memorizable password can be used …

MUSE: an efficient and accurate verifiable privacy‐preserving multikeyword text search over encrypted cloud data

Z Xiangyang, D Hua, Y Xun, Y Geng… - Security and …, 2017 - Wiley Online Library
With the development of cloud computing, services outsourcing in clouds has become a
popular business model. However, due to the fact that data storage and computing are …

A searchable and verifiable data protection scheme for scholarly big data

J Shen, C Wang, A Wang, S Ji… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Scientific research achievements play a positive role in the promotion of social development.
Scholarly big data include scholars' scientific research, experimental data, and their own …

A public-key encryption with multi-keyword search scheme for cloud-based smart grids

D Zhang, Q Fan, H Qiao, M Luo - 2021 IEEE conference on …, 2021 - ieeexplore.ieee.org
The smart grid is viewed as the next generation power system due to its reliability, resiliency,
sustainability and energy efficiency. The smart grid technology has aroused widespread …

Encrypted traffic analytic using identity based encryption with equality test for cloud computing

S Alornyo, M Asante, X Hu… - 2018 IEEE 7th …, 2018 - ieeexplore.ieee.org
In this paper, the concept of identity based encryption with equality test (IBEET) was used to
propose a new scheme for malware detection and verifiability of encrypted data. The use of …