2017 IEEE Symposium on Privacy-Aware Computing (PAC) 2017
DOI: 10.1109/pac.2017.36
|View full text |Cite
|
Sign up to set email alerts
|

Hardening Distributed and Encrypted Keyword Search via Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 17 publications
0
13
0
Order By: Relevance
“…Do et al [25] built a secure distributed storage and private keyword searchable system and realized the integrity authentication of retrieval results with the help of blockchain by storing encrypted data on distributed nodes and storing data fingerprint on the blockchain. Cai et al [26] proposed a distributed storage framework which supported private keyword search. In this framework, the fingerprint of the encrypted documents, the search token, and the metadata for integrity verification were stored on the blockchain, so that the client authentication and fair payment could be obtained.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Do et al [25] built a secure distributed storage and private keyword searchable system and realized the integrity authentication of retrieval results with the help of blockchain by storing encrypted data on distributed nodes and storing data fingerprint on the blockchain. Cai et al [26] proposed a distributed storage framework which supported private keyword search. In this framework, the fingerprint of the encrypted documents, the search token, and the metadata for integrity verification were stored on the blockchain, so that the client authentication and fair payment could be obtained.…”
Section: B Related Workmentioning
confidence: 99%
“…There are related research literatures [22][23][24][25][26][27][28][29][30][31][32][33] on the blockchain-based searchable encryption that only support exact keyword search and allow the user to search encrypted data through keyword, but the scheme supports fuzzy keyword search is still lacking. That is, spelling mistake cannot be tolerated.…”
Section: Introductionmentioning
confidence: 99%
“…Blockchains have also been used in the context of encrypted search. Several works [21,22,29,52] propose to use blockchains to desgin verifiable searchable symmetric encryption (VSSE) schemes. A VSSE scheme is a searchable encryption scheme where the client can verify the correctness of the query results.…”
Section: Related Workmentioning
confidence: 99%
“…Early SE schemes focus on private single keyword retrieval over encrypted documents [19]. Afterwards, many SE schemes were proposed to support various search scenarios including multiple keywords search [20], conjunctive keywords search [21], distributed search [22], [23] and similarity search [24]- [26]. However, most of them are not suitable for encrypted image retrieval tasks.…”
Section: Related Workmentioning
confidence: 99%