2020
DOI: 10.1109/access.2019.2961169
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Verifiable Key-Aggregate Keyword Searchable Encryption for Data Sharing in Outsourcing Storage

Abstract: In a secure data sharing system, users can selectively retrieve encrypted files by performing keyword search over the ciphertext of data. Most of the existing searchable encryption schemes can provide security protection for both data owner and users. Nevertheless, three pivotal issues need to be addressed. Firstly, the cloud might return a wrong result or incomplete result for some reasons, e.g., saving the computing resources. Secondly, users need to store massive keys to generate trapdoors and decrypt the c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
54
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(54 citation statements)
references
References 34 publications
0
54
0
Order By: Relevance
“…The key-aggregate searchable encryption schemes [23] have been proposed to reduce the number of keys for users. Recently, Wang and Cheng [89] proposed an efficient verifiable key-aggregate keyword searchable encryption (EVKAKSE) system model. In this scheme, data owner uploads encrypted files and related encrypted potential keywords to the cloud server.…”
Section: Searchable Encryptionmentioning
confidence: 99%
“…The key-aggregate searchable encryption schemes [23] have been proposed to reduce the number of keys for users. Recently, Wang and Cheng [89] proposed an efficient verifiable key-aggregate keyword searchable encryption (EVKAKSE) system model. In this scheme, data owner uploads encrypted files and related encrypted potential keywords to the cloud server.…”
Section: Searchable Encryptionmentioning
confidence: 99%
“…The constant size of the aggregate key makes the KASE scheme more suitable for devices having limited storage resources, such as smart cards, IoT sensors. However, the existing KASE schemes [4,13,[18][19][20][21]31] use two pairing operations to generate a keyword ciphertext for each keyword to be attached with the document. Similarly, for decryption of ciphertext pairing operations are required.…”
Section: Motivationmentioning
confidence: 99%
“…The authors of [25] show that for different security levels (i.e., for 80 bits, 112 bits and 128 bits) and prime order groups, the pairing operation (on random group elements) requires significantly more time and power resource as compared to the group exponentiation (of a random group element with a random exponent) and multiplication operation. Therefore, the limited power resource of sensor nodes in IoT deployment does not support the expensive computational cost of the existing KASE schemes [4,13,[18][19][20][21]31]. The expensive computational cost of encryption and decryption phases make the existing KASE [4,13,[18][19][20][21]31] schemes infeasible to use in power-constrained devices.…”
Section: Motivationmentioning
confidence: 99%
See 2 more Smart Citations