We consider the following problem: users of an organization wish to outsource the storage of sensitive data to a large database server. It is assumed that the server storing the data is untrusted so the data stored have to be encrypted. We further suppose that the manager of the organization has the right to access all data, but a member of the organization can not access any data alone. The member must collaborate with other members to search for the desired data. In this paper, we investigate the notion of threshold privacy preserving keyword search (TPPKS) and define its security requirements. We construct a TPPKS scheme and show the proof of security under the assumptions of intractability of discrete logarithm, decisional Diffie-Hellma...
Current security mechanisms pose a risk for organisations that outsource their data management to un...
Private searching on streaming data is a process to dispatch to a public server a program, which sea...
The notion of searchable encrypted keywords introduced an elegant approach to retrieve encrypted dat...
We consider the following problem: users of an organization wish to outsource the storage of sensiti...
Many users store their data in a cloud, which might not be fully trusted, for the purpose of conveni...
In this paper we introduce Password Authenticated Keyword Search (PAKS), a cryptographic scheme wher...
Data sharing on public servers has become a popular ser-vice on the Internet, in which users can sto...
In this work, we investigate the privacy-preserving properties of encryption algorithms in the speci...
2016 Elsevier Ltd.Public key encryption with keyword search (PEKS) provides the functionality of enc...
This thesis in the field of cryptography considers secure data outsourcing with keyword search capab...
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over cip...
Private searching on streaming data is a process to dispatch to a public server a program, which sea...
Part 2: Work in ProgressInternational audiencePublic-key Encryption with Keyword Search (PEKS) allow...
Abstract. Current security mechanisms pose a risk for organisations that outsource their data manage...
[[abstract]]Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypt...
Current security mechanisms pose a risk for organisations that outsource their data management to un...
Private searching on streaming data is a process to dispatch to a public server a program, which sea...
The notion of searchable encrypted keywords introduced an elegant approach to retrieve encrypted dat...
We consider the following problem: users of an organization wish to outsource the storage of sensiti...
Many users store their data in a cloud, which might not be fully trusted, for the purpose of conveni...
In this paper we introduce Password Authenticated Keyword Search (PAKS), a cryptographic scheme wher...
Data sharing on public servers has become a popular ser-vice on the Internet, in which users can sto...
In this work, we investigate the privacy-preserving properties of encryption algorithms in the speci...
2016 Elsevier Ltd.Public key encryption with keyword search (PEKS) provides the functionality of enc...
This thesis in the field of cryptography considers secure data outsourcing with keyword search capab...
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over cip...
Private searching on streaming data is a process to dispatch to a public server a program, which sea...
Part 2: Work in ProgressInternational audiencePublic-key Encryption with Keyword Search (PEKS) allow...
Abstract. Current security mechanisms pose a risk for organisations that outsource their data manage...
[[abstract]]Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypt...
Current security mechanisms pose a risk for organisations that outsource their data management to un...
Private searching on streaming data is a process to dispatch to a public server a program, which sea...
The notion of searchable encrypted keywords introduced an elegant approach to retrieve encrypted dat...