Leveraging searchable encryption through homomorphic encryption: A comprehensive analysis
I Amorim, I Costa - Mathematics, 2023 - mdpi.com
The widespread adoption of cloud infrastructures has revolutionized data storage and
access. However, it has also raised concerns regarding the privacy of sensitive data. To …
access. However, it has also raised concerns regarding the privacy of sensitive data. To …
Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems
Y Miao, Y Yang, X Li, KKR Choo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the rapid development of Intelligent Transportation System (ITS), a large number of
spatial data are generated in ITS. Although outsourcing spatial data to the cloud server can …
spatial data are generated in ITS. Although outsourcing spatial data to the cloud server can …
Novel area-efficient and flexible architectures for optimal Ate pairing on FPGA
While FPGA is a suitable platform for implementing cryptographic algorithms, there are
several challenges associated with implementing Optimal Ate pairing on FPGA, such as …
several challenges associated with implementing Optimal Ate pairing on FPGA, such as …
Homomorphic Encryption: An Analysis of its Applications in Searchable Encryption
I Amorim, I Costa - arXiv preprint arXiv:2306.14407, 2023 - arxiv.org
The widespread adoption of cloud infrastructures has revolutionised data storage and
access. However, it has also raised concerns regarding the privacy of sensitive data stored …
access. However, it has also raised concerns regarding the privacy of sensitive data stored …
[PDF][PDF] Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks.
Many organizations have insisted on protecting the cloud server from the outside, although
the risks of attacking the cloud server are mostly from the inside. There are many algorithms …
the risks of attacking the cloud server are mostly from the inside. There are many algorithms …
Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey
Abstract Personal Health Records (PHRs) allow patients to have full control over their health
data. However, storage and sharing of PHRs still remains a difficult but necessary task …
data. However, storage and sharing of PHRs still remains a difficult but necessary task …
VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme
Public key encryption with keyword search (PEKS) allows users to perform keyword
searches of ciphertext on untrusted cloud storage servers, protecting data privacy while …
searches of ciphertext on untrusted cloud storage servers, protecting data privacy while …
Cpu power and network bandwidth-aware optimal block size computation for blockchain-based applications using meta-heuristic algorithms
N Singh - The Journal of Supercomputing, 2023 - Springer
Block size in a permissioned blockchain system plays a huge role in scalability and
performance of system. A large number of blocks are continuously disseminated into the …
performance of system. A large number of blocks are continuously disseminated into the …
[HTML][HTML] Privacy-preserving data dissemination scheme based on Searchable Encryption, publish–subscribe model, and edge computing
Abstract Attribute-based Searchable Encryption is emerging as a promising cryptographic
technique supporting data protection, flexible access control, and keyword search over …
technique supporting data protection, flexible access control, and keyword search over …