Amanote Research

Amanote Research

    RegisterSign In

A Leakage-Abuse Attack Against Multi-User Searchable Encryption

Proceedings on Privacy Enhancing Technologies
doi 10.1515/popets-2017-0034
Full Text
Open PDF
Abstract

Available in full text

Date

July 1, 2017

Authors
Cédric Van RompayRefik MolvaMelek Önen
Publisher

Walter de Gruyter GmbH


Related search

A Searchable Encryption Scheme in a Multi-User Setting for Cloud Storage

International Journal of Security and its Applications
Computer Science
2017English

Verifiable Dynamic Searchable Encryption

Turkish Journal of Electrical Engineering and Computer Sciences
Electronic EngineeringElectricalComputer Science
2019English

An Efficient Multi-Keyword Symmetric Searchable Encryption Scheme for Secure Data Outsourcing

International Journal of Computer Network and Information Security
2016English

Efficient Searchable Encryption Through Compression

Proceedings of the VLDB Endowment
Computer Science
2018English

Searchable Encryption With Data Integrity Verification

DEStech Transactions on Engineering and Technology Research
2017English

A Searchable Re-Encryption Storage Method in Cloud Environment

2018English

Efficient Dynamic Searchable Encryption With Forward Privacy

Proceedings on Privacy Enhancing Technologies
2018English

Searchable Symmetric Encryption With Forward Search Privacy

IEEE Transactions on Dependable and Secure Computing
Electronic EngineeringElectricalComputer Science
2019English

A Structured Multi-Signature Scheme Against Forgery Attack

International Journal of Wireless and Microwave Technologies
2011English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy