Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security 2013
DOI: 10.1145/2484313.2484345
|View full text |Cite
|
Sign up to set email alerts
|

Expressive search on encrypted data

Abstract: Different from the traditional public key encryption, searchable public key encryption allows a data owner to encrypt his data under a user's public key in such a way that the user can generate search token keys using her secret key and then query an encryption storage server. On receiving such a search token key, the server filters all or related stored encryptions and returns matched ones as response.Searchable pubic key encryption has many promising applications. Unfortunately, existing schemes either only … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 51 publications
(44 citation statements)
references
References 42 publications
0
44
0
Order By: Relevance
“…The other asymmetric solution was provided by Di Crescenzo et al in [25], where the authors designed a public-key encryption scheme with keyword search based on a variant of the quadratic residuosity problem. To support more complex queries, conjunctive keyword search, subset query and range query over encrypted data have also been proposed in [7,9,14,26,27].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The other asymmetric solution was provided by Di Crescenzo et al in [25], where the authors designed a public-key encryption scheme with keyword search based on a variant of the quadratic residuosity problem. To support more complex queries, conjunctive keyword search, subset query and range query over encrypted data have also been proposed in [7,9,14,26,27].…”
Section: Related Workmentioning
confidence: 99%
“…In order to enable search over encrypted data, many Searchable Encryption (SE) schemes have been proposed in recent years [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. (Note, we use the term searchable encryption somewhat loosely to include schemes, such as private information retrieval, as well.)…”
Section: Introductionmentioning
confidence: 99%
“…Although our proposed schemes have functional advantages which are shown in Table through comparing with other analogous schemes , DU cannot reconstruct the original file until N file slices have been gained from CSPs. In addition, in actual applications DU cannot restore the whole file f i because of single‐point failure.…”
Section: The Proposed Schemesmentioning
confidence: 99%
“…Then, we theoretically show the computational complexity among our proposed schemes and other analogous schemes. Moreover, we conduct empirical study over a real‐world dataset to show the efficiency and feasibility of our proposed schemes through comparing with ESED , ESPK schemes.…”
Section: Security and Performance Analysismentioning
confidence: 99%
“…Liu et al [16] proposed an efficient privacy preserving keyword search scheme in cloud computing, which allows service providers to participate in partial decipherment to reduce computational overhead in decryption for users. Lai et al [17] proposed a scheme of efficient and expressive search on encrypted data which supports arbitrary monotone boolean predicates.…”
Section: Related Workmentioning
confidence: 99%