{"title":"基于秘密共享方案的图像可搜索加密","authors":"A. Kamal, Keiichi Iwamura, Hyunho Kang","doi":"10.1109/APSIPA.2017.8282269","DOIUrl":null,"url":null,"abstract":"Searchable encryption is a technique applied in cryptography that allows specific information in an encrypted content to be searched. The implementation of searchable encryption of images in cloud-based systems with multiple users allows each user to benefit from cloud computing, while the privacy and security of each content of a user cannot be breached by the other users. This is realized by distributing each image using our proposed secret sharing scheme to ensure that only the owner of the encrypted content is able to access it. In this paper, we describe the implementation method and the realization of searchable image encryption in a real-world application.","PeriodicalId":142091,"journal":{"name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Searchable encryption of image based on secret sharing scheme\",\"authors\":\"A. Kamal, Keiichi Iwamura, Hyunho Kang\",\"doi\":\"10.1109/APSIPA.2017.8282269\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Searchable encryption is a technique applied in cryptography that allows specific information in an encrypted content to be searched. The implementation of searchable encryption of images in cloud-based systems with multiple users allows each user to benefit from cloud computing, while the privacy and security of each content of a user cannot be breached by the other users. This is realized by distributing each image using our proposed secret sharing scheme to ensure that only the owner of the encrypted content is able to access it. In this paper, we describe the implementation method and the realization of searchable image encryption in a real-world application.\",\"PeriodicalId\":142091,\"journal\":{\"name\":\"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/APSIPA.2017.8282269\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APSIPA.2017.8282269","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Searchable encryption of image based on secret sharing scheme
Searchable encryption is a technique applied in cryptography that allows specific information in an encrypted content to be searched. The implementation of searchable encryption of images in cloud-based systems with multiple users allows each user to benefit from cloud computing, while the privacy and security of each content of a user cannot be breached by the other users. This is realized by distributing each image using our proposed secret sharing scheme to ensure that only the owner of the encrypted content is able to access it. In this paper, we describe the implementation method and the realization of searchable image encryption in a real-world application.