A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Boolean symmetric searchable encryption
2013
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13
Our construction of boolean symmetric searchable encryption BSSE is mainly based on the orthogonalization of the keyword field according to the Gram-Schmidt process. ...
In this article we tackle the issue of searchable encryption with a generalized query model. ...
In this article we target a more general model, boolean searchable symmetric encryption, which achieves all basic boolean searches over encrypted data. ...
doi:10.1145/2484313.2484347
dblp:conf/ccs/MoatazS13
fatcat:hkbqrhli4jgw5pemobumnoelzy
Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity
[chapter]
2017
Lecture Notes in Computer Science
Recent work on searchable symmetric encryption (SSE) has focused on increasing its expressiveness. ...
While OXT efficiently supports disjunctive and boolean queries that can be expressed in searchable normal form, it can only handle arbitrary disjunctive and boolean queries in linear time. ...
We also evaluate our Boolean scheme BIEX. Our experiments report setup time, search time, storage and token size for all our constructions. ...
doi:10.1007/978-3-319-56617-7_4
fatcat:ut5np77pfbc4dd6tq5kpkssmty
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
[chapter]
2013
Lecture Notes in Computer Science
This work presents the design and analysis of the first searchable symmetric encryption (SSE) protocol that supports conjunctive search and general Boolean queries on outsourced symmetricallyencrypted ...
To demonstrate the real-world practicality of our approach, we provide performance results of a prototype applied to several large representative data sets, including encrypted search over the whole English ...
Searchable Symmetric Encryption (SSE) is a cryptographic primitive addressing encrypted search. ...
doi:10.1007/978-3-642-40041-4_20
fatcat:ae7kwoxxcrb7djayrsyuhnkfam
Enabling Dynamic Multi-Client and Boolean Query in Searchable Symmetric Encryption Scheme for Cloud Storage System
2022
KSII Transactions on Internet and Information Systems
Searchable symmetric encryption (SSE) provides a safe and effective solution for retrieving encrypted data on cloud servers. ...
Considering the above drawbacks, we propose a scheme enabling dynamic multi-client and Boolean query in searchable symmetric encryption for cloud storage system (DMC-SSE). ...
To provide a truly practical search capability, Cash [15] proposed a highly-scalable searchable symmetric encryption with support for Boolean queries, which constructs the OXT protocol to achieve Boolean ...
doi:10.3837/tiis.2022.04.011
fatcat:w4cilhz5tfauzgvd3w3l4mq3mu
Searchable Encryption Supporting General Boolean Expression Queries
[chapter]
2013
Lecture Notes in Computer Science
We propose a first construction of symmetric searchable encryption that supports generic boolean search over encrypted data which consists of four algorithms: Gen, Enc, Query and T est. ...
Searchable encryption is a mechanism that allows a user to store encrypted documents in an outsourced server, and later on query for some of these documents that match a given keyword. ...
We propose a first construction of symmetric searchable encryption that supports generic boolean search over encrypted data which consists of four algorithms: Gen, Enc, Query and T est. ...
doi:10.1007/978-3-642-39884-1_37
fatcat:5d54rbmgprczpcmg2e7rzng22u
Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing
2016
KSII Transactions on Internet and Information Systems
Due to the graph data being encrypted on the cloud server, a boolean adjacent vertex search is a quite difficult task. ...
In this paper, we propose a solution to perform the boolean adjacent vertex search over encrypted graph data in cloud computing (BASG), which maintains the query tokens and search results privacy. ...
[21] proposed the highly-scalable searchable symmetric encryption supporting boolean queries. ...
doi:10.3837/tiis.2016.10.029
fatcat:xno3uxbp4bcdlcwk7h55v6dzkm
Data Encryption using Geometric Range
2016
Asia-pacific Journal of Convergent Research Interchange
In this paper, we outline a symmetric-key searchable encryption plot that can bolster geometric range questions on encoded spatial information. ...
Searchable encryption is a system to perform significant inquiries on encoded information without uncovering security. ...
Proposed System In this paper, we propose a symmetric-key probabilistic Geometric Range Searchable Encryption. ...
doi:10.21742/apjcri.2016.09.03
fatcat:rep7qgo6fvgwtlu34r4b2sff6y
Fuzzy Based Implementation of Multi - Keyword Ranked Search over Encrypted Cloud Data in Secure Cloud Environment
2017
International Journal of Scientific Research and Management
The works on searchable encryption focused on single keyword search or Boolean keyword search and the result produced by them are rarely sorted. ...
Even though searchable encryption techniques allow users to securely search over encrypted data through keywords, they support only Boolean search and are not yet sufficient to meet the effective data ...
Our construction of Boolean symmetric searchable encryption BSSE is mainly based on the orthogonalization of the keyword field according to the Gram-Schmidt process. ...
doi:10.18535/ijsrm/v5i12.06
fatcat:zqne5kvarzdw7pgeizjwbztmpm
Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation
2015
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15
Searchable symmetric encryption(SSE) allows a client to encrypt his data in such a manner that the data can be efficiently searched. ...
In this paper, we focus on the malicious cloud model and propose a new verifiable searchable symmetric encryption scheme. ...
(iO-based Searchable Symmetric Encryption). ...
doi:10.1145/2714576.2714623
dblp:conf/ccs/ChengYGZR15
fatcat:blrw4uyrwzhkrb3f5w4prym6di
Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities
2012
2012 32nd International Conference on Distributed Computing Systems Workshops
Although these functionalities are already prevalent in information retrieval in the plaintext domain, realizing them in the encrypted domain requires non-trivial effort and is relatively new. ...
BACKGROUND ON SEARCHABLE ENCRYPTION Early searchable encryption schemes were based on Boolean keyword queries. ...
III, we briefly review the existing Boolean keyword searchable encryption schemes. In Sec. ...
doi:10.1109/icdcsw.2012.41
dblp:conf/icdcsw/LiYLH12
fatcat:etuikjcsv5dgbgoiya7rkms5je
Ranking based search in the encrypted cloud environment
2015
International Journal on Recent and Innovation Trends in Computing and Communication
The vector space model helps to provide accuracy sufficient search of data and the Homomorphic encryption enables users to involve in the encryption of data. ...
In MRSE, vector space model and Homomorphic encryption were employed. ...
Searchable symmetric encryption (SSE) scheme allows retrieval of encrypted data over cloud. This project focusses on addressing data privacy problems using SSE. ...
doi:10.17762/ijritcc2321-8169.150289
fatcat:m4oqntsv5jhtlkqtxnd46axwuq
Search, Find and Resolve: Towards a Taxonomy for Searchable Encryption Schemes
2019
Proceedings of the 4th International Conference on Internet of Things, Big Data and Security
Searchable Encryption (SE) schemes are a promising solution to the problem of outsourcing one's data to a cloud provider in a secure way, while still retaining the ability to search for and easily retrieve ...
They mainly differentiate between asymmetric and symmetric encryption. ...
., 2000) , research on Searchable Encryption (SE) delivered numerous articles and diverse SE schemes. ...
doi:10.5220/0007753804140421
dblp:conf/iotbd/KramerSTK19
fatcat:phjo6si2gbg4rg2lmkz6co4zjq
An Approach towards Efficient Ranked Search over Encrypted Cloud
2015
Journal of Information Technology & Software Engineering
Figure 2: Basic system model for secure encrypted search. ...
To achieve more practical performance, system demonstrates an approach for symmetric searchable encryption (SSE) which utilizes information retrieval and cryptography primitives. ...
Related Work Early searchable encryption techniques were only base on exact keyword search [1] [2] [3] [4] [5] [6] . Song et al. gave an SE scheme for symmetric keyword search. ...
doi:10.4172/2165-7866.1000152
fatcat:hha2fh4gk5b5netvjly2dvo3ke
Loss Less and Privacy Preserved Data Retrieval in Cloud Environment using TRSE
2015
International Journal of Wireless and Microwave Technologies
We propose a two round searchable encryption which supports multi keyword retrieval. ...
Here encryption techniques can be used for providing security, but with restricted efficiency. In this paper we propose a new encryption mechanism for providing data security in cloud environment. ...
Variety of encryption mechanisms [5] , [6] , [14] was deployed in the traditional searchable symmetric encryption, which majorly concentrate on Boolean data values. ...
doi:10.5815/ijwmt.2015.06.03
fatcat:qf6yhjildvhotjdqisdbt36qci
Privacy Preserving Ranked Keyword Search over Encrypted Cloud Data
[chapter]
2014
Communications in Computer and Information Science
The data that has to be outsourced is encrypted using symmetric encryption algorithm for data confidentiality. ...
The proposed system can be extended to support Boolean search and Fuzzy keyword search techniques. ...
The construction of Boolean Symmetric Searchable Encryption (BSSE) [11] is mainly based on the orthogonalization of the keyword field according to the Gram-Schmidt process. ...
doi:10.1007/978-3-642-54525-2_35
fatcat:avduz4ydnnhfbjrx32wvausq74
« Previous
Showing results 1 — 15 out of 630 results