2019
DOI: 10.1109/tdsc.2019.2957091
|View full text |Cite
|
Sign up to set email alerts
|

Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution

Abstract: Searchable symmetric encryption (SSE) allows the data owner to outsource an encrypted database to a remote server in a private manner while maintaining the ability for selectively search. So far, most existing solutions focus on an honest-but-curious server, while security designs against a malicious server have not drawn enough attention. A few recent works have attempted to construct verifiable SSE that enables the data owner to verify the integrity of search results. Nevertheless, these verification mechani… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…e few SSE schemes that support multiuser search also require the owner to calculate a search trapdoor [20] online. Multiuser searchable encryption (MUSE) [21] is a significant research content of SE with practical research significance.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…e few SSE schemes that support multiuser search also require the owner to calculate a search trapdoor [20] online. Multiuser searchable encryption (MUSE) [21] is a significant research content of SE with practical research significance.…”
Section: Related Workmentioning
confidence: 99%
“…Chen et al [29] used electronic medical record EHR file indexes to construct complex logical structures and store them on a blockchain so that data users can search the file indexes using these logical expressions. Hu et al [20] enabled users to search private databases in a blockchain environment and implement dynamic access control for searches. However, all of the above schemes outsource complex operations or encrypted data to the blockchain, which greatly degrades the performance of the system.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2017, Liu et al [27] used private blockchain to ensure data integrity. In 2019, Hu et al [28] proposed a blockchain-based data sharing scheme, a decentralized system is established based on smart contracts.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, the function and efficiency of the proposed scheme and other related schemes [19,20,23,24,28] are evaluated and compared. We compared the aforementioned 5 schemes with our scheme in terms of system functions.…”
Section: Performance Analysismentioning
confidence: 99%