2019
DOI: 10.1109/access.2019.2917772
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage

Abstract: In a data sharing system, it is a basic requirement for a user, who has an appropriate privilege to perform keyword retrieval for encrypted documents stored in the cloud. Although traditional searchable encryption technology can provide data protection and retrieval characteristic, there are some main issues should also be considered. First, most existing attribute-based searchable encryption schemes only support single-keyword search, which may return abundant irrelevant search results, resulting in a waste o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(21 citation statements)
references
References 37 publications
(50 reference statements)
0
21
0
Order By: Relevance
“…Until recently, Shen et al [6] stated the importance of sensitive information hiding in detail and creatively proposed a remote auditing scheme supporting such essential attribute. The introduction of this scheme also brings some potential influence to other aspect, such as decreasing the overhead of the ciphertext query [33]- [36], and verification in the untrusted cloud server [37], [38]. However, we observe that three issues are not addressed well in their scheme.…”
Section: A Related Workmentioning
confidence: 94%
“…Until recently, Shen et al [6] stated the importance of sensitive information hiding in detail and creatively proposed a remote auditing scheme supporting such essential attribute. The introduction of this scheme also brings some potential influence to other aspect, such as decreasing the overhead of the ciphertext query [33]- [36], and verification in the untrusted cloud server [37], [38]. However, we observe that three issues are not addressed well in their scheme.…”
Section: A Related Workmentioning
confidence: 94%
“…But the disadvantage is that the two schemes store all the encrypted data in the blockchain, which imposes a certain storage burden on the blockchain. In [19], in view of the problem that most searchable encryption only supports single-keyword search, a multi-keyword search scheme is proposed, and the scope can be reduced to avoid irrelevant documents, thereby reducing the amount of search calculations. However, this solution does not take into account the problem of data update, and is not suitable for scenarios where data changes in real time, such as logistics information.…”
Section: Related Workmentioning
confidence: 99%
“…The authors utilized identity-based encryption (IBE) [ 23 ] and attribute-based encryption (ABE) [ 24 ] to encrypt healthcare information. They also utilized identity-based signatures(IBS) for develop digital signatures.…”
Section: Literature Surveymentioning
confidence: 99%