Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System

    Yanzhong Sun1, Xiaoni Du1,*, Shufen Niu2, Xiaodong Yang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3287-3310, 2024, DOI:10.32604/cmes.2023.043589

    Abstract Traditional email systems can only achieve one-way communication, which means only the receiver is allowed to search for emails on the email server. In this paper, we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption (CL-BSE) by combining the storage function of cloud server with the communication function of email server. In the new model, not only can the data receiver search for the relevant content by generating its own trapdoor, but the data owner also can retrieve the content in the same way. Meanwhile, there are dual… More >

  • Open Access

    ARTICLE

    Efficient Multi-Authority Attribute-Based Searchable Encryption Scheme with Blockchain Assistance for Cloud-Edge Coordination

    Peng Liu1, Qian He1,*, Baokang Zhao2, Biao Guo1, Zhongyi Zhai1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3325-3343, 2023, DOI:10.32604/cmc.2023.041167

    Abstract Cloud storage and edge computing are utilized to address the storage and computational challenges arising from the exponential data growth in IoT. However, data privacy is potentially risky when data is outsourced to cloud servers or edge services. While data encryption ensures data confidentiality, it can impede data sharing and retrieval. Attribute-based searchable encryption (ABSE) is proposed as an effective technique for enhancing data security and privacy. Nevertheless, ABSE has its limitations, such as single attribute authorization failure, privacy leakage during the search process, and high decryption overhead. This paper presents a novel approach called the blockchain-assisted efficient multi-authority attribute-based… More >

  • Open Access

    ARTICLE

    Secure Content Based Image Retrieval Scheme Based on Deep Hashing and Searchable Encryption

    Zhen Wang, Qiu-yu Zhang*, Ling-tao Meng, Yi-lin Liu

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6161-6184, 2023, DOI:10.32604/cmc.2023.037134

    Abstract To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security, retrieval efficiency, and retrieval accuracy. This research suggests a searchable encryption and deep hashing-based secure image retrieval technique that extracts more expressive image features and constructs a secure, searchable encryption scheme. First, a deep learning framework based on residual network and transfer learning model is designed to extract more representative image deep features. Secondly, the central similarity is used to quantify and construct the deep hash sequence of features. The Paillier homomorphic encryption encrypts the deep hash sequence to build a high-security and… More >

  • Open Access

    ARTICLE

    Efficient Expressive Attribute-Based Encryption with Keyword Search over Prime-Order Groups

    Qing Miao1, Lan Guo1, Yang Lu1,*, Zhongqi Wang2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2737-2754, 2023, DOI:10.32604/iasc.2023.028693

    Abstract Attribute-based encryption with keyword search (ABEKS) is a novel cryptographic paradigm that can be used to implement fine-grained access control and retrieve ciphertexts without disclosing the sensitive information. It is a perfect combination of attribute-based encryption (ABE) and public key encryption with keyword search (PEKS). Nevertheless, most of the existing ABEKS schemes have limited search capabilities and only support single or simple conjunctive keyword search. Due to the weak search capability and inaccurate search results, it is difficult to apply these schemes to practical applications. In this paper, an efficient expressive ABEKS (EABEKS) scheme supporting unbounded keyword universe over prime-order… More >

  • Open Access

    ARTICLE

    Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search

    Hyun Sook Rhee*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 69-85, 2022, DOI:10.32604/cmc.2022.026751

    Abstract As the use of cloud storage for various services increases, the amount of private personal information along with data stored in the cloud storage is also increasing. To remotely use the data stored on the cloud storage, the data to be stored needs to be encrypted for this reason. Since “searchable encryption” is enable to search on the encrypted data without any decryption, it is one of convenient solutions for secure data management. A public key encryption with keyword search (for short, PEKS) is one of searchable encryptions. Abdalla et al. firstly defined IND-CCA security for PEKS to enhance it’s… More >

  • Open Access

    ARTICLE

    A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain

    Gang Xu1, Yibo Cao1, Shiyuan Xu1, Xin Liu2,*, Xiu-Bo Chen3, Yiying Yu1, Xiaojun Wang4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5429-5441, 2022, DOI:10.32604/cmc.2022.028562

    Abstract With the increasing popularity of cloud storage, data security on the cloud has become increasingly visible. Searchable encryption has the ability to realize the privacy protection and security of data in the cloud. However, with the continuous development of quantum computing, the standard Public-key Encryption with Keyword Search (PEKS) scheme cannot resist quantum-based keyword guessing attacks. Further, the credibility of the server also poses a significant threat to the security of the retrieval process. This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems. Firstly, we design a lattice-based encryption primitive to… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Framework for Secure Storage and Sharing of Resumes

    Huanrong Tang1, Changlin Hu1, Tianming Liu2, Jianquan Ouyang1,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5395-5413, 2022, DOI:10.32604/cmc.2022.028284

    Abstract In response to problems in the centralized storage of personal resumes on third-party recruitment platforms, such as inadequate privacy protection, inability of individuals to accurately authorize downloads, and inability to determine who downloaded the resume and when, this study proposes a blockchain-based framework for secure storage and sharing of resumes. Users can employ an authorized access mechanism to protect their privacy rights. The proposed framework uses smart contracts, interplanetary file system, symmetric encryption, and digital signatures to protect, verify, and share resumes. Encryption keys are split and stored in multiple depositories through secret-sharing technology to improve the security of these… More >

  • Open Access

    ARTICLE

    An Effective Blockchain Based Secure Searchable Encryption System

    Aitizaz Ali1, Mehedi Masud2, Ateeq ur Rehman3, Can Chen1, Mehmood4, Mohammad A. AlZain5, Jehad Ali6,*

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1183-1195, 2022, DOI:10.32604/iasc.2022.023930

    Abstract Security of Patient health records (PHR) is the most important aspect of cryptography over the Internet due to its value and importance preferably in the medical Internet of Things (IoT). Search keywords access mechanism is one of the common approaches which is used to access PHR from database, but it is susceptible to various security vulnerabilities. Although Blockchain-enabled healthcare systems provide security, but it may lead to some loopholes in the existing schemes. However, these methods primarily focused on data storage, and blockchain is used as a database. In this paper, Blockchain as a distributed database is proposed with homomorphic… More >

  • Open Access

    ARTICLE

    Attribute-Based Keyword Search over the Encrypted Blockchain

    Zhen Yang1, Hongao Zhang1, Haiyang Yu1,*, Zheng Li1, Bocheng Zhu1, Richard O. Sinnott2

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.1, pp. 269-282, 2021, DOI:10.32604/cmes.2021.015210

    Abstract To address privacy concerns, data in the blockchain should be encrypted in advance to avoid data access from all users in the blockchain. However, encrypted data cannot be directly retrieved, which hinders data sharing in the blockchain. Several works have been proposed to deal with this problem. However, the data retrieval in these schemes requires the participation of data owners and lacks finer-grained access control. In this paper, we propose an attribute-based keyword search scheme over the encrypted blockchain, which allows users to search encrypted files over the blockchain based on their attributes. In addition, we build a file chain… More >

  • Open Access

    ARTICLE

    IoT Services: Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption

    Chungen Xu1,*, Lin Mei1, Jinxue Cheng2, Yu Zhao1, Cong Zuo3

    Journal of Cyber Security, Vol.3, No.1, pp. 55-67, 2021, DOI:10.32604/jcs.2021.017217

    Abstract With the rapid development of wireless communication technology, the Internet of Things is playing an increasingly important role in our everyday. The amount of data generated by sensor devices is increasing as a large number of connectable devices are deployed in many fields, including the medical, agricultural, and industrial areas. Uploading data to the cloud solves the problem of data overhead but results in privacy issues. Therefore, the question of how to manage the privacy of uploading data and make it available to be interconnected between devices is a crucial issue. In this paper, we propose a scheme that supports… More >

Displaying 1-10 on page 1 of 15. Per Page