In this paper, we consider a setting where a user wants to outsource storage of a large amount of private data, and then perform pattern matching queries on the data; that is, given a data string s and a “pattern ” string p, find all occurrences of p as a substring of s. We formalize the security properties desired in this type of setting by defining a type of encryption called queryable encryption. In a queryable encryption scheme, a user can encrypt a message M under a secret key, and using the secret key can generate tokens for queries q. Applying a token for a query q to an encryption of M gives the answer to the query q on M. We consider security against both honest-but-curious and malicious adversaries, and define properties guarantee...
Searchable encryption is a technique that allows a client to store documents on a server in encrypte...
In this paper, we provide an efficient and easy-to-implement symmetric searchable encryption scheme ...
Searchable encryption is a technique that allows a client to store documents on a server in encrypte...
In this paper, we consider a setting where a user wants to outsource storage of a large amount of pr...
In this paper, we consider a setting where a client wants to outsource storage of a large amount of ...
Searchable encryption is a cryptographic primitive that allows a client to out-source encrypted data...
Searchable encryption is a cryptographic primitive that allows a client to out- source encrypted dat...
Searching on remote encrypted data (commonly known as searchable en-cryption) has become an importan...
Searching on remote encrypted data (commonly known as searchable encryption) has become an important...
In this paper, we propose a new searchable encryption with shiftable trapdoor (SEST) scheme to enabl...
Outsourcing data storage is a topic of emerging importance in database security. In this paper, we ...
In this paper we consider the problem of secure pattern matching that allows single-character wildc...
Symmetric searchable encryption (SSE) allows to outsource encrypted data to an untrusted server and ...
The current trend towards outsourcing data storage and management to the cloud has largely been driv...
Abstract. Asymmetric searchable encryption allows searches to be carried over cipher-texts, through ...
Searchable encryption is a technique that allows a client to store documents on a server in encrypte...
In this paper, we provide an efficient and easy-to-implement symmetric searchable encryption scheme ...
Searchable encryption is a technique that allows a client to store documents on a server in encrypte...
In this paper, we consider a setting where a user wants to outsource storage of a large amount of pr...
In this paper, we consider a setting where a client wants to outsource storage of a large amount of ...
Searchable encryption is a cryptographic primitive that allows a client to out-source encrypted data...
Searchable encryption is a cryptographic primitive that allows a client to out- source encrypted dat...
Searching on remote encrypted data (commonly known as searchable en-cryption) has become an importan...
Searching on remote encrypted data (commonly known as searchable encryption) has become an important...
In this paper, we propose a new searchable encryption with shiftable trapdoor (SEST) scheme to enabl...
Outsourcing data storage is a topic of emerging importance in database security. In this paper, we ...
In this paper we consider the problem of secure pattern matching that allows single-character wildc...
Symmetric searchable encryption (SSE) allows to outsource encrypted data to an untrusted server and ...
The current trend towards outsourcing data storage and management to the cloud has largely been driv...
Abstract. Asymmetric searchable encryption allows searches to be carried over cipher-texts, through ...
Searchable encryption is a technique that allows a client to store documents on a server in encrypte...
In this paper, we provide an efficient and easy-to-implement symmetric searchable encryption scheme ...
Searchable encryption is a technique that allows a client to store documents on a server in encrypte...