Gotowa bibliografia na temat „Dynamic Searchable Symmetric Encryption”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Dynamic Searchable Symmetric Encryption”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Dynamic Searchable Symmetric Encryption"
Du, Ruizhong, Yuqing Zhang i Mingyue Li. "Database Padding for Dynamic Symmetric Searchable Encryption". Security and Communication Networks 2021 (31.12.2021): 1–12. http://dx.doi.org/10.1155/2021/9703969.
Pełny tekst źródłaGuo, Chen, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li i Ting Wu. "Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing". Information 9, nr 10 (28.09.2018): 242. http://dx.doi.org/10.3390/info9100242.
Pełny tekst źródłaKissel, Zachary A., i Jie Wang. "Generic Adaptively Secure Searchable Phrase Encryption". Proceedings on Privacy Enhancing Technologies 2017, nr 1 (1.01.2017): 4–20. http://dx.doi.org/10.1515/popets-2017-0002.
Pełny tekst źródłaCui, Shujie, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith i Giovanni Russello. "Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage". ACM Transactions on Privacy and Security 24, nr 3 (31.08.2021): 1–35. http://dx.doi.org/10.1145/3446920.
Pełny tekst źródłaZhang, Yu, Yin Li i Yifan Wang. "Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search". Security and Communication Networks 2020 (16.07.2020): 1–16. http://dx.doi.org/10.1155/2020/7298518.
Pełny tekst źródłaEtemad, Mohammad, Alptekin Küpçü, Charalampos Papamanthou i David Evans. "Efficient Dynamic Searchable Encryption with Forward Privacy". Proceedings on Privacy Enhancing Technologies 2018, nr 1 (1.01.2018): 5–20. http://dx.doi.org/10.1515/popets-2018-0002.
Pełny tekst źródłaWang, Jiafan, i Sherman S. M. Chow. "Forward and Backward-Secure Range-Searchable Symmetric Encryption". Proceedings on Privacy Enhancing Technologies 2022, nr 1 (20.11.2021): 28–48. http://dx.doi.org/10.2478/popets-2022-0003.
Pełny tekst źródłaBilbul, Salim, i Ayad Abdulsada. "Backward Private Searchable Symmetric Encryption with Improved Locality". Iraqi Journal for Electrical and Electronic Engineering 17, nr 2 (17.07.2021): 17–26. http://dx.doi.org/10.37917/ijeee.17.2.3.
Pełny tekst źródłaZhang, Xi, Ye Su i Jing Qin. "A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security". Security and Communication Networks 2020 (20.10.2020): 1–13. http://dx.doi.org/10.1155/2020/8893016.
Pełny tekst źródłaHuang, Ke, Xiaolei Dong, Zhenfu Cao i Jiachen Shen. "Dynamic searchable symmetric encryption schemes with forward and backward security". IOP Conference Series: Materials Science and Engineering 715 (3.01.2020): 012062. http://dx.doi.org/10.1088/1757-899x/715/1/012062.
Pełny tekst źródłaRozprawy doktorskie na temat "Dynamic Searchable Symmetric Encryption"
Nordahl, Christian, i Malin Lindström. "The BXT-Bitmap : An Efficient Searchable Symmetric Encryption Scheme". Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12062.
Pełny tekst źródłaChenette, Nathan Lee. "Symmetric schemes for efficient range and error-tolerant search on encrypted data". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/48976.
Pełny tekst źródłaŠkoda, Martin. "Implementace symetrické blokové šifry AES na moderních procesorech". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220616.
Pełny tekst źródłaWu, Chia-Feng, i 吳嘉峰. "Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/69702371852681789221.
Pełny tekst źródła國立臺灣大學
電機工程學研究所
103
Searchable symmetric encryption (SSE) is a more and more important technique for cloud computing. It lets us can store critical data by encryption in the untrusted cloud server but allows us search the encrypted data with the keyword. The server will not know the keyword and the data content but it can retrieval the correct data to us. However, a database with SSE is not enough practical because the data is not invariable. In general, we modify the data frequently even if it stores in the remote server. The server must can update the encrypted data without decryption. Dynamic searchable symmetric encryption (DSSE) is designed to support the above function. We can add or delete the encrypted data on the server but with no need for decryption. The previous research proposes many schemes for constructing a DSSE system. It can be based on link-list structure or a new primitive called Blind Storage. Each of them has respective advantage and drawback about its function extensibility and efficiency. Nevertheless, for a real available system, the most important key is the tradeoff between performance and security. In this paper, we will implement different DSSE systems to compare their efficiency and security. We can find the disadvantage of the existing DSSE scheme and try to improve it by analyzing the experiment result.
Liu, Cheng-Wei, i 劉正偉. "Dynamic and Efficient Provable Data Possession for Electronic Health Record System &; Symmetric Searchable Encryption Implementation". Thesis, 2013. http://ndltd.ncl.edu.tw/handle/35316429617917002288.
Pełny tekst źródła國立交通大學
資訊科學與工程研究所
101
We propose a data integrity check scheme for electronic health record system. In our scheme, the patient can check the integrity of his health records when he finished uploading his health records. Obviously, our scheme is based on HMAC, so the computing time of the proof and the verification in our scheme is short. Our scheme also allows the patient to modify his health records on the server. In the end, we design a testing EHR system which allows the patient to check the correctness of his health records. We consider that the user may outsource his files to the server. To protect the confidentiality of his files, the user will outsource his files with encrypted form. As a result, the user can’t search over the encrypted files easily. Searchable symmetric encryption (SSE) allows the user to outsource the storage of his data to the server in a private manner, while maintaining the ability to selectively search over it. We build a keyword-searching system based on SSE scheme. Our system also allows the user to download the encrypted files associated with the search result. Last, we analyze the performance of our system.
Shah, Akash. "Efficient and Secure Search over Encrypted Data". Thesis, 2019. https://etd.iisc.ac.in/handle/2005/4691.
Pełny tekst źródłaChang, Li-Tzu, i 張儷子. "Efficient Conjunctive Keyword-Based Symmetric Searchable Encryption". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/rp5p8u.
Pełny tekst źródła國立中興大學
資訊科學與工程學系所
99
In the era of cloud computing, private information in the open network server can be accessed anywhere and anytime. As a result, the protection of personal private informa-tion becomes very important. Keyword-searchable encryption has been proposed to protect private information stored in servers while allowing clients to retrieve needed information based on keyword searching. In this thesis, we propose an efficient key-word-searchable encryption scheme. The proposed scheme with conjunctive keyword search is secure against adaptive chosen keyword attacks. Moreover, comparing to pre-vious schemes, the proposed scheme has lower communication overhead and computa-tion cost.
Oliveira, Filipe Miguel Santos de. "A Systems Approach to Searchable Encryption". Master's thesis, 2020. http://hdl.handle.net/10362/116774.
Pełny tekst źródłaO aumento da oferta de serviços na cloud veio facilitar o acesso a recursos de hardware e software. O número de clientes destes serviços tem vindo a aumentar e, com isso, aumentou o volume de dados que são armazenados nos servidores dos fornecedores. Contudo, muitos destes dados contêm informações que devem ser protegidas, por forma a garantir a privacidade dos seus proprietários. A Criptografia Pesquisável (CP) e a Criptografia Simétrica Pesquisável (CSP) permitem, de forma eficiente, garantir a proteção dos dados e a capacidade de pesquisa dos mesmos, quando colocados em servidores dos fornecedores de serviços na cloud. No entanto, apesar dos vários trabalhos elaborados nesta área, alguns detalhes não são considerados ou são relegados para análises posteriores. Todavia, estes aspetos têm de ser estudados por forma a permitir a integração dos esquemas de CP com as operações sobre ficheiros reais. Realizou-se a análise de alguns dos trabalhos mais recentes na área da CP e foram identificados os tópicos deixados em aberto na literatura mas que devem ser considerados quando se pretende desenvolver um sistema real que faça a manipulação de ficheiros. Estes tópicos dizem respeito ao armazenamento e operações realizadas sobre os ficheiros, custo financeiros, libertação de espaço dos índices, tratamento dos nomes originais dos ficheiros e suporte para múltiplas soluções de armazenamento. Na sequência do trabalho de investigação, analisou-se a arquitetura tradicional dos esquemas de CP e desenhou-se uma nova arquitetura que não utiliza computação na cloud. Estas arquiteturas serviram de base à implementação de três sistemas que integram a manipulação de ficheiros reais com as operações do esquema de CP e que incorporam as propostas de solução para o tópico do armazenamento e operações sobre ficheiros, tratamento dos nomes dos ficheiros e operações de reindexação. Os sistemas desenvolvidos foram avaliados no que respeita à sua performance, custos de operação e informações reveladas ao fornecedor de serviços. Para além das soluções técnicas encontradas para os tópicos identificados no estudo, e que foram incorporadas nos sistemas, concluiu-se ainda que os sistemas testados apresentam vantagens em áreas distintas. O sistema que implementa a arquitetura tradicional cliente-servidor permite melhores performances na realização das operações enquanto que o sistema que implementa a nova arquitetura e recorre à utilização de um buffer e de uma cache apresenta custos de operação mais baixos e revela menos informação ao fornecedor de serviços, conseguindo garantir a propriedade de backward privacy. O sistema que apenas utiliza um serviço de armazenamento revelou-se inadequado para uma utilização real, em virtude dos tempos elevados de inserção de elementos nos índices.
Jheng, Ren-Jen, i 鄭仁傑. "Research and Implementation of Unlinkable Searchable Symmetric Encryption Schemes for Cloud Storage". Thesis, 2013. http://ndltd.ncl.edu.tw/handle/41868079914619377925.
Pełny tekst źródła樹德科技大學
資訊工程系碩士班
101
The cloud storage service provides users a very convenient and omnipresent way to store and access data. Behind the convenient service, however, there exist many security issues. Services hardware equipment is not a user can control or during the transfer of files may be intercepted. In order to protect data, many users will encrypt their files in advance before uploading them to the cloud storage. But the original search method has been unable to effectively search the cipher text. Therefore, how to achieve an efficient and secure search on cipher text becomes an important topic of cloud storage services. Because of these several security issues, let searchable encryption has become a particular field of research. This technology allows the server to search for files without decrypting. Moreover, the interested parties may perform statistical analysis by using fixed searching patterns. In order to solve the early searchable encryption architecture shortcomings, many scholars put forward their own schemas that can be used in accordance with the encryption algorithms divided into two categories: symmetric searchable encryption and asymmetric searchable encryption. The former is use symmetric encryption encrypt the plaintext and keywords and latter is the use of asymmetric encryption to encrypt the plaintext and keywords. However, in these architectures still have privacy issues. Transmitted fixity search pattern in the search process will produce privacy risks, leading to a third party on the network or cloud servers can statistical analysis user''s search keywords and the association between the cipher text. This research proposes an unlinkable cipher text search scheme used symmetric encryption. The proposed scheme constructs unlinkable searching patterns from redundant and keywords by expansion and permutation technologies. And the cloud server will respond false positive searching results due to the collision of searching patterns. The searching performance is efficient by means of using linked lists and indexed searching tables. Course of the study will also use JAVA to implement this architecture. According to the results of implementation to analyze operation and search efficiency. Through theoretical calculations to analyze search pattern is statistical and analytical possibilities. According to the results of calculation and implementation, and then analyzes the security and performance. The analysis of security and performance confirms the proposed scheme provides higher efficiency and user privacy. Keywords: Cloud storage, Searchable encryption, Unlinkable, false positive.
Borges, Guilherme Rosas. "Practical Isolated Searchable Encryption in a Trusted Computing Environment". Master's thesis, 2018. http://hdl.handle.net/10362/59506.
Pełny tekst źródłaCzęści książek na temat "Dynamic Searchable Symmetric Encryption"
Krähenbühl, Cyrill, i Adrian Perrig. "Searchable Symmetric Encryption". W Trends in Data Protection and Encryption Technologies, 71–75. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_14.
Pełny tekst źródłaMinaud, Brice, i Michael Reichle. "Dynamic Local Searchable Symmetric Encryption". W Advances in Cryptology – CRYPTO 2022, 91–120. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-15985-5_4.
Pełny tekst źródłaKamara, Seny, i Charalampos Papamanthou. "Parallel and Dynamic Searchable Symmetric Encryption". W Financial Cryptography and Data Security, 258–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39884-1_22.
Pełny tekst źródłaGajek, Sebastian. "Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption". W Topics in Cryptology - CT-RSA 2016, 75–89. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29485-8_5.
Pełny tekst źródłaKurosawa, Kaoru, Keisuke Sasaki, Kiyohiko Ohta i Kazuki Yoneyama. "UC-Secure Dynamic Searchable Symmetric Encryption Scheme". W Advances in Information and Computer Security, 73–90. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44524-3_5.
Pełny tekst źródłaChung-Nguyen, Huy-Hoang, Viet-An Pham, Dinh-Hieu Hoang i Minh-Triet Tran. "Keyword-Search Interval-Query Dynamic Symmetric Searchable Encryption". W Future Data and Security Engineering, 673–80. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35653-8_46.
Pełny tekst źródłaWang, Qiao, Yu Guo, Hejiao Huang i Xiaohua Jia. "Multi-user Forward Secure Dynamic Searchable Symmetric Encryption". W Network and System Security, 125–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02744-5_9.
Pełny tekst źródłaWeener, Jeroen, Florian Hahn i Andreas Peter. "Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards". W Lecture Notes in Computer Science, 215–35. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10684-2_13.
Pełny tekst źródłaZuo, Cong, Shi-Feng Sun, Joseph K. Liu, Jun Shao i Josef Pieprzyk. "Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy". W Lecture Notes in Computer Science, 283–303. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29962-0_14.
Pełny tekst źródłaChen, Lanxiang, i Zhenchao Chen. "Practical, Dynamic and Efficient Integrity Verification for Symmetric Searchable Encryption". W Cryptology and Network Security, 163–83. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31578-8_9.
Pełny tekst źródłaStreszczenia konferencji na temat "Dynamic Searchable Symmetric Encryption"
Kamara, Seny, Charalampos Papamanthou i Tom Roeder. "Dynamic searchable symmetric encryption". W the 2012 ACM conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2382196.2382298.
Pełny tekst źródłaShibata, Toshiya, i Kazuki Yoneyama. "Universally Composable Forward Secure Dynamic Searchable Symmetric Encryption". W ASIA CCS '21: ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3457338.3458290.
Pełny tekst źródłaSalmani, Khosro, i Ken Barker. "Dynamic Searchable Symmetric Encryption with Full Forward Privacy". W 2020 IEEE 5th International Conference on Signal and Image Processing (ICSIP). IEEE, 2020. http://dx.doi.org/10.1109/icsip49896.2020.9339338.
Pełny tekst źródłaWu, Chia-Feng, Yen-Wu Ti, Sy-Yen Kuo i Chia-Mu Yu. "Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding". W 2019 International Conference on Intelligent Computing and its Emerging Applications (ICEA). IEEE, 2019. http://dx.doi.org/10.1109/icea.2019.8858302.
Pełny tekst źródłaOzmen, Muslum Ozgur, Thang Hoang i Attila A. Yavuz. "Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search". W 2018 IEEE International Conference on Communications (ICC 2018). IEEE, 2018. http://dx.doi.org/10.1109/icc.2018.8422480.
Pełny tekst źródłaChen, Jing, Zhenfu Cao, Jiachen Shen, Xiaolei Dong i Xingkai Wang. "Forward Secure Dynamic Searchable Symmetric Encryption with Lighter Storage". W ICCSP 2020: 2020 4th International Conference on Cryptography, Security and Privacy. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3377644.3377666.
Pełny tekst źródłaKim, Kee Sung, Minkyu Kim, Dongsoo Lee, Je Hong Park i Woo-Hwan Kim. "Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates". W CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3133956.3133970.
Pełny tekst źródłaXu, Wanshan, Jianbiao Zhang, Yilin Yuan i Zheng Li. "Privacy-preserving Multi-cloud based Dynamic Symmetric Searchable Encryption". W 2021 2nd International Conference on Computer Communication and Network Security (CCNS). IEEE, 2021. http://dx.doi.org/10.1109/ccns53852.2021.00040.
Pełny tekst źródłaPeng, Yu, Qin Liu, Yue Tian, Jie Wu, Tian Wang, Tao Peng i Guojun Wang. "Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy". W 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2021. http://dx.doi.org/10.1109/trustcom53373.2021.00070.
Pełny tekst źródłaYang, Yi, Hongwei Li, Wenchao Liu, Haomiao Yao i Mi Wen. "Secure dynamic searchable symmetric encryption with constant document update cost". W GLOBECOM 2014 - 2014 IEEE Global Communications Conference. IEEE, 2014. http://dx.doi.org/10.1109/glocom.2014.7036902.
Pełny tekst źródła