2018
DOI: 10.1007/978-3-319-76578-5_4
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Key Searchable Encryption, Revisited

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(43 citation statements)
references
References 32 publications
0
36
0
Order By: Relevance
“…STE was introduced by Chase and Kamara in [18] as a generalization of SSE. Many works have explored various aspects of SSE including dynamism [30], [42], [41], [70], [10], [17], [11], [23], locality [17], [15], [4], [55], [21], expressiveness [18], [14], [59], [24], [54], [40], [43], multiple clients [19], [39], [60], [35], and leakage [27], [45], [44], [3].…”
Section: Sse/ste Sse Was Introduced By Song Wagner Andmentioning
confidence: 99%
“…STE was introduced by Chase and Kamara in [18] as a generalization of SSE. Many works have explored various aspects of SSE including dynamism [30], [42], [41], [70], [10], [17], [11], [23], locality [17], [15], [4], [55], [21], expressiveness [18], [14], [59], [24], [54], [40], [43], multiple clients [19], [39], [60], [35], and leakage [27], [45], [44], [3].…”
Section: Sse/ste Sse Was Introduced By Song Wagner Andmentioning
confidence: 99%
“…These features can make the operations of a cloud storage service efficient because the keys and encrypted data become easier to manage for both a data owner and users. We note that these features are not implied in previous systems, namely, multiuser searchable encryption [5]- [8] and multi-key searchable encryption [2], [4], which do not include efficient management described above in their scope. Therefore, achieving the features described above is a non-trivial problem.…”
Section: A Backgroundmentioning
confidence: 98%
“…In a framework of conventional searchable encryption, the multi-user setting [5]- [8], [22], [23] and the multi-key setting [2], [4], [24] have been known to control the searchability for each document. However, an efficient control of the searchability, such as issuance of aggregate keys which is one of the main problems in KASE, is out of the scope of such settings.…”
Section: Related Workmentioning
confidence: 99%
“…Curtmola et al [19] proposed the most widely used security definition and the first scheme with non-trivial search time. It has since been improved in several ways, e.g., support for multiple users [49], [50], [33], more expressive queries including relational databases, conjunctive keywords, and graph queries [13], [34], [17], [41], [35], [22], [40], or efficient ondisk storage [14], [43], [7], [23], [20].…”
Section: B Related Workmentioning
confidence: 99%