2006
DOI: 10.1007/11774716_15
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Conjunctive Keyword Search on Encrypted Data Storage System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 75 publications
(30 citation statements)
references
References 8 publications
0
28
0
Order By: Relevance
“…Since 2004, several articles focus on extending the search options to enable especially conjunctive search [15,6,18,19,22,23,16,3,7]. A natural question arises then: why do we need special schemes for performing conjunctive queries?…”
Section: State Of the Artmentioning
confidence: 98%
“…Since 2004, several articles focus on extending the search options to enable especially conjunctive search [15,6,18,19,22,23,16,3,7]. A natural question arises then: why do we need special schemes for performing conjunctive queries?…”
Section: State Of the Artmentioning
confidence: 98%
“…In public key settings, a first conjunctive keyword searchable scheme is defined by Park et al [8]. Subsequently, the schemes with the improved communication and storage efficiency are proposed in [9,28]. Boneh and Waters have given a generalized scheme [29] for conjunction as well as for subset queries.…”
Section: Related Workmentioning
confidence: 99%
“…All other dedicated solutions require server work that is linear in the size of the database. Of these solutions, the one that provides the best privacy guarantees is due to Golle et al [13], with variants presented in later work, e.g., [1,3]. They show how to build for each conjunctive query a set of tokens that can be tested against each document in the database (more precisely, against an encoded version of the document's keywords) to identify matching documents.…”
Section: Introductionmentioning
confidence: 99%
“…Our implementation of this protocol, which we name OXT, uses only DH-type operations over any DiffieHellman group which enables the use of the secure and most efficient DH elliptic curves (with additional common-base optimizations). 3 The complexity of our search protocols is independent of the number of documents in the database. To search for documents containing w 1 , .…”
Section: Introductionmentioning
confidence: 99%