[[abstract]]We study the development of conjunctive keyword searchable scheme which enables one to search encrypted documents by using more than one keyword. The notion of conjunctive keyword searching was presented by Golle et al. in 2004. However, their security model was constructed in a symmetric-key setting which is not applicable for the overall applications in the reality. So Park et al. extended Golle et al.'s security model into a public-key setting which calls the Public Key Encryption with Conjunctive Field Keyword Search (PECKS) scheme. In this paper, we examine six security models by concluding the secret-key setting and public-key setting, and sum up six security requirements that must satisfy to construct a secure conjunctive...
To solve the problem of searching on encrypted data, many keyword search schemes have been proposed ...
We consider the following problem: users in a dynamic group store their encrypted documents on an un...
We consider the following problem: users in a dynamic group store their encrypted documents on an un...
[[abstract]]We study the development of conjunctive keyword searchable scheme which enables one to s...
This thesis in the field of cryptography considers secure data storage outsourcing with keyword sear...
We consider the following problem: a user stores encrypted documents on an untrusted server, and wis...
Searchable public key encryption supporting conjunctive keyword search is an important technique in ...
We introduce mechanisms for secure keyword searches on a document server. We propose protocols with ...
The searchable encryption scheme can perform keywords search operation directly over encrypted data ...
This thesis in the field of cryptography considers secure data outsourcing with keyword search capab...
[[abstract]]Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypt...
The primitive of Searchable Symmetric Encryption (SSE) allows a server to perform search directly ov...
International audienceWhile storing documents on the cloud can be attractive, the question remains w...
Searchable encryption allows a cloud server to conduct keyword search over encrypted data on behalf ...
International audienceHonest but curious cloud servers can make inferences about the stored encrypte...
To solve the problem of searching on encrypted data, many keyword search schemes have been proposed ...
We consider the following problem: users in a dynamic group store their encrypted documents on an un...
We consider the following problem: users in a dynamic group store their encrypted documents on an un...
[[abstract]]We study the development of conjunctive keyword searchable scheme which enables one to s...
This thesis in the field of cryptography considers secure data storage outsourcing with keyword sear...
We consider the following problem: a user stores encrypted documents on an untrusted server, and wis...
Searchable public key encryption supporting conjunctive keyword search is an important technique in ...
We introduce mechanisms for secure keyword searches on a document server. We propose protocols with ...
The searchable encryption scheme can perform keywords search operation directly over encrypted data ...
This thesis in the field of cryptography considers secure data outsourcing with keyword search capab...
[[abstract]]Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypt...
The primitive of Searchable Symmetric Encryption (SSE) allows a server to perform search directly ov...
International audienceWhile storing documents on the cloud can be attractive, the question remains w...
Searchable encryption allows a cloud server to conduct keyword search over encrypted data on behalf ...
International audienceHonest but curious cloud servers can make inferences about the stored encrypte...
To solve the problem of searching on encrypted data, many keyword search schemes have been proposed ...
We consider the following problem: users in a dynamic group store their encrypted documents on an un...
We consider the following problem: users in a dynamic group store their encrypted documents on an un...