Leveraging searchable encryption through homomorphic encryption: A comprehensive analysis

I Amorim, I Costa - Mathematics, 2023 - mdpi.com
The widespread adoption of cloud infrastructures has revolutionized data storage and
access. However, it has also raised concerns regarding the privacy of sensitive data. To …

Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems

Y Miao, Y Yang, X Li, KKR Choo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the rapid development of Intelligent Transportation System (ITS), a large number of
spatial data are generated in ITS. Although outsourcing spatial data to the cloud server can …

Novel area-efficient and flexible architectures for optimal Ate pairing on FPGA

O Azzouzi, M Anane, M Koudil, M Issad… - The Journal of …, 2024 - Springer
While FPGA is a suitable platform for implementing cryptographic algorithms, there are
several challenges associated with implementing Optimal Ate pairing on FPGA, such as …

Homomorphic Encryption: An Analysis of its Applications in Searchable Encryption

I Amorim, I Costa - arXiv preprint arXiv:2306.14407, 2023 - arxiv.org
The widespread adoption of cloud infrastructures has revolutionised data storage and
access. However, it has also raised concerns regarding the privacy of sensitive data stored …

[PDF][PDF] Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks.

M Nadeem, A Arshad, S Riaz, SW Zahra… - … , Materials & Continua, 2023 - researchgate.net
Many organizations have insisted on protecting the cloud server from the outside, although
the risks of attacking the cloud server are mostly from the inside. There are many algorithms …

Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey

A Bisht, AK Das, D Giri - Security and Privacy, 2024 - Wiley Online Library
Abstract Personal Health Records (PHRs) allow patients to have full control over their health
data. However, storage and sharing of PHRs still remains a difficult but necessary task …

VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme

Y Tang, Y Chen, Y Luo, S Dong, T Li - Applied Sciences, 2023 - mdpi.com
Public key encryption with keyword search (PEKS) allows users to perform keyword
searches of ciphertext on untrusted cloud storage servers, protecting data privacy while …

Cpu power and network bandwidth-aware optimal block size computation for blockchain-based applications using meta-heuristic algorithms

N Singh - The Journal of Supercomputing, 2023 - Springer
Block size in a permissioned blockchain system plays a huge role in scalability and
performance of system. A large number of blocks are continuously disseminated into the …

[HTML][HTML] Privacy-preserving data dissemination scheme based on Searchable Encryption, publish–subscribe model, and edge computing

I Huso, D Sparapano, G Piro, G Boggia - Computer Communications, 2023 - Elsevier
Abstract Attribute-based Searchable Encryption is emerging as a promising cryptographic
technique supporting data protection, flexible access control, and keyword search over …

[图书][B] Searchable Encryption: From Concepts to Systems

K Ren, C Wang - 2023 - Springer
This book comprehensively reviews searchable encryption, which represents a series of
research developments that directly enable search functionality over encrypted data. The …