Searchable Encryption News Today : Breaking News, Live Updates & Top Stories | Vimarsana

Stay updated with breaking news from Searchable encryption. Get real-time updates on events, politics, business, and more. Visit us for reliable news and exclusive interviews.

Top News In Searchable Encryption Today - Breaking & Trending Today

"Geometric Searchable Encryption Without False Positive And Its Applica" by Zhenhua Chen, Jingjing Nie et al.

As a prominent cryptographic tool, geometric searchable encryption (GSE) can be applied in many scenarios, such as location-based services (LBS), social networks and vehicle networks. Unfortunately, most of existing searchable encryption schemes supporting the functionality of geometric range searches suffer from false positives, which will lead people to make a wrong decision and further raise some serious consequences such as financial loss. In addition, some of them are designed under a symmetric system, which is not enough flexible deployed in LBS since in a symmetric system only a private key holder creates ciphertext, whereas in a public-key system anyone who holds a public key can produce ciphertext. In this paper, we intend to design a novel GSE scheme without any false positive under a public-key system supporting arbitrary geometric area searches, which is able to guarantee an accurate query result. Toward this goal, we develop a novel technique in handling the relation betwe ....

Geometric Range Search , Inner Product Encryption , Searchable Encryption , Ithout Any False Positive ,

"Privacy-Preserving Multi-User Outsourced Computation for Boolean Circu" by Xueqiao Liu, Guomin Yang et al.

With the prevalence of outsourced computation, such as Machine Learning as a Service, protecting the privacy of sensitive data throughout the whole computation is a critical yet challenging task. The problem becomes even more tricky when multiple sources of input and/or multiple recipients of output are involved, who would encrypt/decrypt data using different keys. Considering many computation tasks demand binary operands and operations but there are only outsourced computation constructions for arithmetic calculations, in this paper, the authors propose a privacy-preserving outsourced computation framework for Boolean circuits. The proposed framework can protect sensitive data throughout the whole computation, i.e., input, output and all the intermediate values, ensuring privacy for general outsourced tasks. Moreover, it compresses the ciphertext domain of Liu et al., (2016) and attains secure protocols for four logic gates (AND, OR, NOT, and XOR) which are the basic operations in Boo ....

Machine Learning , Bloom Filter , Multi Keyword Searchable Encryption , Bitwise Operation , Bloom Filter , Boolean Circuit , Multi User , Searchable Encryption ,

Traffers. WiFi protocol flaw. Cross-chain bridge attacks. Email security. A shift in Russian cyber ops. Piracy as patriotism.

Traffers. WiFi protocol flaw. Cross-chain bridge attacks. Email security. A shift in Russian cyber ops. Piracy as patriotism.
thecyberwire.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from thecyberwire.com Daily Mail and Mail on Sunday newspapers.

United States , Slovak Republic , Israel General , Spelman College , North Korea , Palo Alto , Florida International University , Avtonomna Respublika , United Kingdom , Menlo Park , Ukraine General , Republic Of Azerbaijan , North Korean , Porter Collins , Kevin Sheu , Gopal Bhagia , Ben Shapiro , Vladimir Putin , Natalia Harris , Leonid Belkind , Vanson Bourne , Sam Bankman , Volodymyr Zelenskyy , Victor Ferreira , Johns Hopkins , Ciaran Martin ,

"Public-Key Authenticated Encryption With Keyword Search Supporting Con" by Hongbo Li, Qiong Huang et al.

To improve the quality of medical care and reduce unnecessary medical errors, electronic medical records (EMRs) are widely applied in hospital information systems. However, rapidly increasing EMRs bring heavy storage burden to hospitals. Professional data management service provided by cloud server can save the hospital local storage, and meanwhile, realize EMRs sharing among external researchers. However, the risk of leaking information of patients discourages hospitals to outsource patients' EMRs to the remote cloud server. In this paper, a secure and efficient cloud storing and sharing method can be achieved by applying the proposed public key authenticated encryption with ciphertext update and keyword search (PAUKS). The proposed PAUKS scheme enables EMRs to be encrypted and queried without decryption, and is secure against inside keyword guessing attacks. Compared with the recently proposed PAEKS in literature, the PAUKS scheme enjoys smaller computation and communication ove ....

Electronic Medical Record , Fast Search , Keyword Guessing Attacks , Light Overhead , Searchable Encryption ,