Loading...

Verifiable Searchable Encryption Schemes

Adibifar, Ali | 2024

0 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 57135 (02)
  4. University: Sharif University of Technology
  5. Department: Mathematical Sciences
  6. Advisor(s): Khazaei, Shahram; Rafiee Korkvandi, Mojtaba
  7. Abstract:
  8. The rapid development of cloud services encourages companies to outsource data and related processes to cloud servers. Using these services has significant effects compared to the traditional process. However, since cloud servers are not completely reliable, data outsourcing can raise some security concerns, such as data confidentiality and privacy protection. Search encryption schemes allow users to outsource their documents securely while maintaining the ability to perform secure queries. These external agents can be classified into two categories based on their trustworthiness: the honest-curious agent and the malicious agent. In the honest-curious scenario, the agent adheres to a specified protocol and refrains from unauthorized modifications but may attempt to gather information about the outsourced data and query requests. In contrast, the malicious agent can deviate from the specified protocol and even compromise the outsourced data through deletion or alteration. In this research, search encryption schemes against malicious agents have been discussed and investigated. For example, this research explores the challenges and existing constructions, focusing on aspects such as security definitions, privacy, and reliability in various search encryption scheme scenarios
  9. Keywords:
  10. Secure Computation ; Data Outsourcing ; Searchable Encryption ; Verifiable Encryption

 Digital Object List

 Bookmark

...see more