Search Results - Searchable encryption algorithm
-
1
Algorithm Substitution‐Resistant SM9‐Based Searchable Encryption With Cryptographic Reverse Firewall for Cloud Storage
ISSN: 1532-0626, 1532-0634Published: Hoboken, USA John Wiley & Sons, Inc 15.05.2025Published in Concurrency and computation (15.05.2025)“…‐based searchable encryption schemes. Additionally, existing protocols lack proactive defense mechanisms, making them vulnerable to insider threats that compromise system integrity…”
Get full text
Journal Article -
2
Leveraging Grover’s Algorithm for Quantum Searchable Encryption in Cloud Infrastructure and its application in AES Resource Estimation
ISSN: 1572-9575, 0020-7748, 1572-9575Published: New York Springer US 21.08.2024Published in International journal of theoretical physics (21.08.2024)“… Grover’s algorithm, a quantum counterpart of searching algorithms, has proven to provide quadratic speedup over any classical search technique on an unsorted database…”
Get full text
Journal Article -
3
Multi-User Searchable Encryption Scheme for IoT Scenarios Based on Bloom Filter
ISSN: 1000-3428Published: Editorial Office of Computer Engineering 01.07.2025Published in Ji suan ji gong cheng (01.07.2025)“…Searchable encryption technology utilizes extracted keywords as indexes to search for specific documents within a document collection…”
Get full text
Journal Article -
4
Searchable encryption algorithm in computer big data processing application
ISSN: 0005-1144, 1848-3380Published: Ljubljana Taylor & Francis Ltd 02.10.2023Published in Automatika (02.10.2023)“… The emergence of keyword search encryption algorithms solves this problem. When users use keywords to search encryption algorithms, they can search…”
Get full text
Journal Article Paper -
5
Ciphertext Database Audit Technology Under Searchable Encryption Algorithm and Blockchain Technology
ISSN: 1062-7375, 1533-7995Published: Hershey IGI Global 01.01.2022Published in Journal of global information management (01.01.2022)“… First, the existing encryption algorithms are analyzed. Second, the searchable encryption algorithm is proposed to audit the ciphertext data, and an audit server scheme is made based on blockchain technology (BT…”
Get full text
Journal Article -
6
Searchable encryption algorithm based on key aggregation of multiple data owners in data sharing
ISSN: 2214-2126Published: Elsevier Ltd 01.11.2023Published in Journal of information security and applications (01.11.2023)“… In this paper, we propose a searchable encryption algorithm based on the key aggregation of multiple data owners…”
Get full text
Journal Article -
7
An improved scheme of searchable encryption algorithm based on NTRU
ISSN: 1742-6588, 1742-6596Published: Bristol IOP Publishing 01.11.2019Published in Journal of physics. Conference series (01.11.2019)“…R. Behnia et al proposed a NTRU-based searchable encryption scheme in 2017. Compared with the previous searchable encryption scheme, this scheme has a great improvement in security and efficiency, and can resist quantum computing…”
Get full text
Journal Article -
8
A DYNAMIC SYMMETRIC SEARCHABLE ENCRYPTION ALGORITHM WITH AN EXTENDED DUAL-INDEX STRUCTURE LEVERAGING IPFS
ISSN: 2286-3540Published: Bucharest University Polytechnica of Bucharest 01.01.2024Published in Scientific Bulletin. Series C, Electrical Engineering and Computer Science (01.01.2024)“… This paper improves the dynamic symmetric searchable encryption algorithm based on a dual-index structure…”
Get full text
Journal Article -
9
Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment
ISSN: 2376-5992, 2376-5992Published: United States PeerJ. Ltd 20.06.2023Published in PeerJ. Computer science (20.06.2023)“… However, the existing searchable encryption algorithms mainly ignore the data explosion problem in a cloud computing environment…”
Get full text
Journal Article -
10
Research on Logistics Information Blockchain Data Query Algorithm Based on Searchable Encryption
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2021Published in IEEE access (2021)“…In order to ensure the security of logistics information and to query information quickly and efficiently, using searchable encryption algorithms, combined with the characteristics of the blockchain…”
Get full text
Journal Article -
11
An Efficient and More Secure Searchable Encryption Algorithm Based On Fully Homomorphic Encryption
Published: IEEE 20.10.2023Published in 2023 International Conference on Automation, Control and Electronics Engineering (CACEE) (20.10.2023)“…) methods and searchable encryption (SE) methods. This under-scores the importance of securing clients' private information while using CSP services…”
Get full text
Conference Proceeding -
12
Searchable encryption based on a chaotic system and AES algorithm
ISSN: 2252-8814, 2252-8814Published: 01.09.2025Published in International Journal of Advances in Applied Sciences (01.09.2025)“… This is where enhancing cloud security with searchable encryption (SE) is crucial. SE effectively secures users…”
Get full text
Journal Article -
13
Blockchain-based secure data sharing with overlapping clustering and searchable encryption
ISSN: 0920-5489Published: Elsevier B.V 01.04.2025Published in Computer standards and interfaces (01.04.2025)“… To ensure the security of shared data, plaintext data is often replaced by encrypted data for sharing, and searchable encryption algorithms are used to improve the efficiency of sharing…”
Get full text
Journal Article -
14
A Novel System for Managing Encrypted Data Using Searchable Encryption Techniques
ISSN: 2158-107X, 2156-5570Published: West Yorkshire Science and Information (SAI) Organization Limited 2025Published in International journal of advanced computer science & applications (2025)“… Therefore, the objective of this study is to implement and evaluate a contemporary set of searchable encryption algorithms within a web-based platform…”
Get full text
Journal Article -
15
Searchable Encryption Scheme Based on China State Cryptography Standard SM9
ISSN: 1000-3428Published: Editorial Office of Computer Engineering 01.07.2022Published in Ji suan ji gong cheng (01.07.2022)“…To meet the requirements of the security level of ciphertext data, existing identity-based Searchable Encryption(SE…”
Get full text
Journal Article -
16
Registered Keyword Searchable Encryption Based on SM9
ISSN: 2076-3417, 2076-3417Published: Basel MDPI AG 01.03.2023Published in Applied sciences (01.03.2023)“…The SM9 algorithm is an Identity-Based Encryption (IBE) algorithm independently made by China…”
Get full text
Journal Article -
17
Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based Encryption Schemes
ISSN: 2410-387X, 2410-387XPublished: Basel MDPI AG 01.06.2023Published in Cryptography (01.06.2023)“… Attribute-based encryption brings the ability of fine-grained access control and can achieve a direct encrypted data search while being combined with searchable encryption algorithms…”
Get full text
Journal Article -
18
A Searchable Encryption with Forward/Backward Security and Constant Storage
ISSN: 2076-3417, 2076-3417Published: Basel MDPI AG 01.02.2023Published in Applied sciences (01.02.2023)“… However, cloud servers with dynamically updatable data are vulnerable to information abuse and file injection attacks, and current public key-based dynamic searchable encryption algorithms are often…”
Get full text
Journal Article -
19
Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme
ISSN: 1383-7621Published: Elsevier B.V 01.09.2024Published in Journal of systems architecture (01.09.2024)“… Many researchers have proposed fine-grained access control schemes and searchable encryption algorithms to support privacy-preserving data sharing…”
Get full text
Journal Article -
20
Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing
ISSN: 1383-7621, 1873-6165Published: Elsevier B.V 01.11.2023Published in Journal of systems architecture (01.11.2023)“… In this paper, we propose a blockchain-assisted multi-keyword fuzzy search encryption (BCFSE) scheme for secure data sharing which supports fine-grained access control and attribute revocation…”
Get full text
Journal Article