2020
DOI: 10.1016/j.adhoc.2019.102028
|View full text |Cite
|
Sign up to set email alerts
|

An efficient queries processing model based on Multi Broadcast Searchable Keywords Encryption (MBSKE)

Abstract: The version presented here may differ from the published version or from the version of the record. Please see the repository URL above for details on accessing the published version and note that access may require a subscription.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 29 publications
(29 reference statements)
0
3
0
Order By: Relevance
“…In cryptographic research, 50 Wang et al 51 proposed an efficient proxy re‐encryption scheme, which can reduce the client cost and ensure flexible data sharing between users and their partners. Al‐Maytami et al 52 proposed a new search algorithm called multicast searchable keyword encryption, which can hide all the user's information and the query content of the cloud server through a set of encrypted keywords.…”
Section: The Related Workmentioning
confidence: 99%
“…In cryptographic research, 50 Wang et al 51 proposed an efficient proxy re‐encryption scheme, which can reduce the client cost and ensure flexible data sharing between users and their partners. Al‐Maytami et al 52 proposed a new search algorithm called multicast searchable keyword encryption, which can hide all the user's information and the query content of the cloud server through a set of encrypted keywords.…”
Section: The Related Workmentioning
confidence: 99%
“…Therefore, researchers are continuously working on the development of novel security techniques [ 3 , 4 ]. It is evident in previous researches that adopting cryptography is the best solution for cyber-security [ 5 ].…”
Section: Introductionmentioning
confidence: 99%
“…Authentication and key establishment (AKE) is the mechanism to identify devices' and users' legitimacy in 6LoWPANs [11] and to set up a secret session key (SK) for encrypted communication. Therefore, a lightweight AKE mechanism becomes imperative for securing the network [12][13][14][15][16][17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%