2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) 2017
DOI: 10.1109/cscloud.2017.47
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Currently, recall (R), precision (P) and F1 score are also commonly used to evaluate the performance and quality of network models, and the calculation formula is shown in Eqs. (16)(17)(18). Table 3 shows the comparison of P, R and F1 scores of CNN-BiGRU models under different CPOs (Re-sampling, MP3 compression, Amplitude increase, Amplitude decrease, and Add noise).…”
Section: Speech Retrieval Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Currently, recall (R), precision (P) and F1 score are also commonly used to evaluate the performance and quality of network models, and the calculation formula is shown in Eqs. (16)(17)(18). Table 3 shows the comparison of P, R and F1 scores of CNN-BiGRU models under different CPOs (Re-sampling, MP3 compression, Amplitude increase, Amplitude decrease, and Add noise).…”
Section: Speech Retrieval Performance Analysismentioning
confidence: 99%
“…Kalapaaking et al [16] proposed a global model verification method based on blockchain multi-signature and stored the signature in the blockchain to prevent tampering. Ramasamy et al [17] designed a new homomorphic MAC to provide a dynamic, verifiable, high-security keyword retrieval scheme. Li et al [18] proposed a SE scheme under multi-user conditions, combining smart contracts to reduce the verification cost.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Sardar et al [12] used a bilinear digital signature based on a dynamic SSE scheme to achieve forward security and public verifiability. Ramasamy et al [13] used the bitmap index and homomorphic MAC to dynamically update the documents and verify search results without leaking the access pattern. However, most of the existing verifiable searchable encryption schemes only focus on detecting malicious behavior, but lack a mechanism to punish dishonest performers.…”
Section: B Related Workmentioning
confidence: 99%
“…Subsequently, their scheme was implemented in the network coding‐enabled wireless networks [16], as well as P2P live streaming systems [32]. Recent investigations on homomorphic MAC can be also found in [3335] etc. Although homomorphic MACs are more computationally efficient than homomorphic hashes, they still have several significant weaknesses, including larger bandwidth overhead and the key distribution and management problem.…”
Section: Related Workmentioning
confidence: 99%