Academic literature on the topic 'Dynamic Searchable Symmetric Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Dynamic Searchable Symmetric Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Dynamic Searchable Symmetric Encryption"
Du, Ruizhong, Yuqing Zhang, and Mingyue Li. "Database Padding for Dynamic Symmetric Searchable Encryption." Security and Communication Networks 2021 (December 31, 2021): 1–12. http://dx.doi.org/10.1155/2021/9703969.
Full textGuo, Chen, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li, and Ting Wu. "Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing." Information 9, no. 10 (September 28, 2018): 242. http://dx.doi.org/10.3390/info9100242.
Full textKissel, Zachary A., and Jie Wang. "Generic Adaptively Secure Searchable Phrase Encryption." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (January 1, 2017): 4–20. http://dx.doi.org/10.1515/popets-2017-0002.
Full textCui, Shujie, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, and Giovanni Russello. "Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage." ACM Transactions on Privacy and Security 24, no. 3 (August 31, 2021): 1–35. http://dx.doi.org/10.1145/3446920.
Full textZhang, Yu, Yin Li, and Yifan Wang. "Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search." Security and Communication Networks 2020 (July 16, 2020): 1–16. http://dx.doi.org/10.1155/2020/7298518.
Full textEtemad, Mohammad, Alptekin Küpçü, Charalampos Papamanthou, and David Evans. "Efficient Dynamic Searchable Encryption with Forward Privacy." Proceedings on Privacy Enhancing Technologies 2018, no. 1 (January 1, 2018): 5–20. http://dx.doi.org/10.1515/popets-2018-0002.
Full textWang, Jiafan, and Sherman S. M. Chow. "Forward and Backward-Secure Range-Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (November 20, 2021): 28–48. http://dx.doi.org/10.2478/popets-2022-0003.
Full textBilbul, Salim, and Ayad Abdulsada. "Backward Private Searchable Symmetric Encryption with Improved Locality." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (July 17, 2021): 17–26. http://dx.doi.org/10.37917/ijeee.17.2.3.
Full textZhang, Xi, Ye Su, and Jing Qin. "A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security." Security and Communication Networks 2020 (October 20, 2020): 1–13. http://dx.doi.org/10.1155/2020/8893016.
Full textHuang, Ke, Xiaolei Dong, Zhenfu Cao, and Jiachen Shen. "Dynamic searchable symmetric encryption schemes with forward and backward security." IOP Conference Series: Materials Science and Engineering 715 (January 3, 2020): 012062. http://dx.doi.org/10.1088/1757-899x/715/1/012062.
Full textDissertations / Theses on the topic "Dynamic Searchable Symmetric Encryption"
Nordahl, Christian, and Malin Lindström. "The BXT-Bitmap : An Efficient Searchable Symmetric Encryption Scheme." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12062.
Full textChenette, Nathan Lee. "Symmetric schemes for efficient range and error-tolerant search on encrypted data." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/48976.
Full textŠkoda, Martin. "Implementace symetrické blokové šifry AES na moderních procesorech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220616.
Full textWu, Chia-Feng, and 吳嘉峰. "Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/69702371852681789221.
Full text國立臺灣大學
電機工程學研究所
103
Searchable symmetric encryption (SSE) is a more and more important technique for cloud computing. It lets us can store critical data by encryption in the untrusted cloud server but allows us search the encrypted data with the keyword. The server will not know the keyword and the data content but it can retrieval the correct data to us. However, a database with SSE is not enough practical because the data is not invariable. In general, we modify the data frequently even if it stores in the remote server. The server must can update the encrypted data without decryption. Dynamic searchable symmetric encryption (DSSE) is designed to support the above function. We can add or delete the encrypted data on the server but with no need for decryption. The previous research proposes many schemes for constructing a DSSE system. It can be based on link-list structure or a new primitive called Blind Storage. Each of them has respective advantage and drawback about its function extensibility and efficiency. Nevertheless, for a real available system, the most important key is the tradeoff between performance and security. In this paper, we will implement different DSSE systems to compare their efficiency and security. We can find the disadvantage of the existing DSSE scheme and try to improve it by analyzing the experiment result.
Liu, Cheng-Wei, and 劉正偉. "Dynamic and Efficient Provable Data Possession for Electronic Health Record System &; Symmetric Searchable Encryption Implementation." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/35316429617917002288.
Full text國立交通大學
資訊科學與工程研究所
101
We propose a data integrity check scheme for electronic health record system. In our scheme, the patient can check the integrity of his health records when he finished uploading his health records. Obviously, our scheme is based on HMAC, so the computing time of the proof and the verification in our scheme is short. Our scheme also allows the patient to modify his health records on the server. In the end, we design a testing EHR system which allows the patient to check the correctness of his health records. We consider that the user may outsource his files to the server. To protect the confidentiality of his files, the user will outsource his files with encrypted form. As a result, the user can’t search over the encrypted files easily. Searchable symmetric encryption (SSE) allows the user to outsource the storage of his data to the server in a private manner, while maintaining the ability to selectively search over it. We build a keyword-searching system based on SSE scheme. Our system also allows the user to download the encrypted files associated with the search result. Last, we analyze the performance of our system.
Shah, Akash. "Efficient and Secure Search over Encrypted Data." Thesis, 2019. https://etd.iisc.ac.in/handle/2005/4691.
Full textChang, Li-Tzu, and 張儷子. "Efficient Conjunctive Keyword-Based Symmetric Searchable Encryption." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/rp5p8u.
Full text國立中興大學
資訊科學與工程學系所
99
In the era of cloud computing, private information in the open network server can be accessed anywhere and anytime. As a result, the protection of personal private informa-tion becomes very important. Keyword-searchable encryption has been proposed to protect private information stored in servers while allowing clients to retrieve needed information based on keyword searching. In this thesis, we propose an efficient key-word-searchable encryption scheme. The proposed scheme with conjunctive keyword search is secure against adaptive chosen keyword attacks. Moreover, comparing to pre-vious schemes, the proposed scheme has lower communication overhead and computa-tion cost.
Oliveira, Filipe Miguel Santos de. "A Systems Approach to Searchable Encryption." Master's thesis, 2020. http://hdl.handle.net/10362/116774.
Full textO aumento da oferta de serviços na cloud veio facilitar o acesso a recursos de hardware e software. O número de clientes destes serviços tem vindo a aumentar e, com isso, aumentou o volume de dados que são armazenados nos servidores dos fornecedores. Contudo, muitos destes dados contêm informações que devem ser protegidas, por forma a garantir a privacidade dos seus proprietários. A Criptografia Pesquisável (CP) e a Criptografia Simétrica Pesquisável (CSP) permitem, de forma eficiente, garantir a proteção dos dados e a capacidade de pesquisa dos mesmos, quando colocados em servidores dos fornecedores de serviços na cloud. No entanto, apesar dos vários trabalhos elaborados nesta área, alguns detalhes não são considerados ou são relegados para análises posteriores. Todavia, estes aspetos têm de ser estudados por forma a permitir a integração dos esquemas de CP com as operações sobre ficheiros reais. Realizou-se a análise de alguns dos trabalhos mais recentes na área da CP e foram identificados os tópicos deixados em aberto na literatura mas que devem ser considerados quando se pretende desenvolver um sistema real que faça a manipulação de ficheiros. Estes tópicos dizem respeito ao armazenamento e operações realizadas sobre os ficheiros, custo financeiros, libertação de espaço dos índices, tratamento dos nomes originais dos ficheiros e suporte para múltiplas soluções de armazenamento. Na sequência do trabalho de investigação, analisou-se a arquitetura tradicional dos esquemas de CP e desenhou-se uma nova arquitetura que não utiliza computação na cloud. Estas arquiteturas serviram de base à implementação de três sistemas que integram a manipulação de ficheiros reais com as operações do esquema de CP e que incorporam as propostas de solução para o tópico do armazenamento e operações sobre ficheiros, tratamento dos nomes dos ficheiros e operações de reindexação. Os sistemas desenvolvidos foram avaliados no que respeita à sua performance, custos de operação e informações reveladas ao fornecedor de serviços. Para além das soluções técnicas encontradas para os tópicos identificados no estudo, e que foram incorporadas nos sistemas, concluiu-se ainda que os sistemas testados apresentam vantagens em áreas distintas. O sistema que implementa a arquitetura tradicional cliente-servidor permite melhores performances na realização das operações enquanto que o sistema que implementa a nova arquitetura e recorre à utilização de um buffer e de uma cache apresenta custos de operação mais baixos e revela menos informação ao fornecedor de serviços, conseguindo garantir a propriedade de backward privacy. O sistema que apenas utiliza um serviço de armazenamento revelou-se inadequado para uma utilização real, em virtude dos tempos elevados de inserção de elementos nos índices.
Jheng, Ren-Jen, and 鄭仁傑. "Research and Implementation of Unlinkable Searchable Symmetric Encryption Schemes for Cloud Storage." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/41868079914619377925.
Full text樹德科技大學
資訊工程系碩士班
101
The cloud storage service provides users a very convenient and omnipresent way to store and access data. Behind the convenient service, however, there exist many security issues. Services hardware equipment is not a user can control or during the transfer of files may be intercepted. In order to protect data, many users will encrypt their files in advance before uploading them to the cloud storage. But the original search method has been unable to effectively search the cipher text. Therefore, how to achieve an efficient and secure search on cipher text becomes an important topic of cloud storage services. Because of these several security issues, let searchable encryption has become a particular field of research. This technology allows the server to search for files without decrypting. Moreover, the interested parties may perform statistical analysis by using fixed searching patterns. In order to solve the early searchable encryption architecture shortcomings, many scholars put forward their own schemas that can be used in accordance with the encryption algorithms divided into two categories: symmetric searchable encryption and asymmetric searchable encryption. The former is use symmetric encryption encrypt the plaintext and keywords and latter is the use of asymmetric encryption to encrypt the plaintext and keywords. However, in these architectures still have privacy issues. Transmitted fixity search pattern in the search process will produce privacy risks, leading to a third party on the network or cloud servers can statistical analysis user''s search keywords and the association between the cipher text. This research proposes an unlinkable cipher text search scheme used symmetric encryption. The proposed scheme constructs unlinkable searching patterns from redundant and keywords by expansion and permutation technologies. And the cloud server will respond false positive searching results due to the collision of searching patterns. The searching performance is efficient by means of using linked lists and indexed searching tables. Course of the study will also use JAVA to implement this architecture. According to the results of implementation to analyze operation and search efficiency. Through theoretical calculations to analyze search pattern is statistical and analytical possibilities. According to the results of calculation and implementation, and then analyzes the security and performance. The analysis of security and performance confirms the proposed scheme provides higher efficiency and user privacy. Keywords: Cloud storage, Searchable encryption, Unlinkable, false positive.
Borges, Guilherme Rosas. "Practical Isolated Searchable Encryption in a Trusted Computing Environment." Master's thesis, 2018. http://hdl.handle.net/10362/59506.
Full textBook chapters on the topic "Dynamic Searchable Symmetric Encryption"
Krähenbühl, Cyrill, and Adrian Perrig. "Searchable Symmetric Encryption." In Trends in Data Protection and Encryption Technologies, 71–75. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_14.
Full textMinaud, Brice, and Michael Reichle. "Dynamic Local Searchable Symmetric Encryption." In Advances in Cryptology – CRYPTO 2022, 91–120. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-15985-5_4.
Full textKamara, Seny, and Charalampos Papamanthou. "Parallel and Dynamic Searchable Symmetric Encryption." In Financial Cryptography and Data Security, 258–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39884-1_22.
Full textGajek, Sebastian. "Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption." In Topics in Cryptology - CT-RSA 2016, 75–89. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29485-8_5.
Full textKurosawa, Kaoru, Keisuke Sasaki, Kiyohiko Ohta, and Kazuki Yoneyama. "UC-Secure Dynamic Searchable Symmetric Encryption Scheme." In Advances in Information and Computer Security, 73–90. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44524-3_5.
Full textChung-Nguyen, Huy-Hoang, Viet-An Pham, Dinh-Hieu Hoang, and Minh-Triet Tran. "Keyword-Search Interval-Query Dynamic Symmetric Searchable Encryption." In Future Data and Security Engineering, 673–80. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35653-8_46.
Full textWang, Qiao, Yu Guo, Hejiao Huang, and Xiaohua Jia. "Multi-user Forward Secure Dynamic Searchable Symmetric Encryption." In Network and System Security, 125–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02744-5_9.
Full textWeener, Jeroen, Florian Hahn, and Andreas Peter. "Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards." In Lecture Notes in Computer Science, 215–35. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10684-2_13.
Full textZuo, Cong, Shi-Feng Sun, Joseph K. Liu, Jun Shao, and Josef Pieprzyk. "Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy." In Lecture Notes in Computer Science, 283–303. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29962-0_14.
Full textChen, Lanxiang, and Zhenchao Chen. "Practical, Dynamic and Efficient Integrity Verification for Symmetric Searchable Encryption." In Cryptology and Network Security, 163–83. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31578-8_9.
Full textConference papers on the topic "Dynamic Searchable Symmetric Encryption"
Kamara, Seny, Charalampos Papamanthou, and Tom Roeder. "Dynamic searchable symmetric encryption." In the 2012 ACM conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2382196.2382298.
Full textShibata, Toshiya, and Kazuki Yoneyama. "Universally Composable Forward Secure Dynamic Searchable Symmetric Encryption." In ASIA CCS '21: ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3457338.3458290.
Full textSalmani, Khosro, and Ken Barker. "Dynamic Searchable Symmetric Encryption with Full Forward Privacy." In 2020 IEEE 5th International Conference on Signal and Image Processing (ICSIP). IEEE, 2020. http://dx.doi.org/10.1109/icsip49896.2020.9339338.
Full textWu, Chia-Feng, Yen-Wu Ti, Sy-Yen Kuo, and Chia-Mu Yu. "Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding." In 2019 International Conference on Intelligent Computing and its Emerging Applications (ICEA). IEEE, 2019. http://dx.doi.org/10.1109/icea.2019.8858302.
Full textOzmen, Muslum Ozgur, Thang Hoang, and Attila A. Yavuz. "Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search." In 2018 IEEE International Conference on Communications (ICC 2018). IEEE, 2018. http://dx.doi.org/10.1109/icc.2018.8422480.
Full textChen, Jing, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, and Xingkai Wang. "Forward Secure Dynamic Searchable Symmetric Encryption with Lighter Storage." In ICCSP 2020: 2020 4th International Conference on Cryptography, Security and Privacy. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3377644.3377666.
Full textKim, Kee Sung, Minkyu Kim, Dongsoo Lee, Je Hong Park, and Woo-Hwan Kim. "Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3133956.3133970.
Full textXu, Wanshan, Jianbiao Zhang, Yilin Yuan, and Zheng Li. "Privacy-preserving Multi-cloud based Dynamic Symmetric Searchable Encryption." In 2021 2nd International Conference on Computer Communication and Network Security (CCNS). IEEE, 2021. http://dx.doi.org/10.1109/ccns53852.2021.00040.
Full textPeng, Yu, Qin Liu, Yue Tian, Jie Wu, Tian Wang, Tao Peng, and Guojun Wang. "Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy." In 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2021. http://dx.doi.org/10.1109/trustcom53373.2021.00070.
Full textYang, Yi, Hongwei Li, Wenchao Liu, Haomiao Yao, and Mi Wen. "Secure dynamic searchable symmetric encryption with constant document update cost." In GLOBECOM 2014 - 2014 IEEE Global Communications Conference. IEEE, 2014. http://dx.doi.org/10.1109/glocom.2014.7036902.
Full text