2006
DOI: 10.1007/11604938_25
|View full text |Cite
|
Sign up to set email alerts
|

Oblivious Conjunctive Keyword Search

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2006
2006
2020
2020

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 11 publications
(19 citation statements)
references
References 11 publications
0
19
0
Order By: Relevance
“…In short, DOKS needs to transfer m(n+2)|p| bits, and the total computation is about (2n+6m+1) module exponentiations (E) and m(n+1) module multiplications (M), while the OKS protocol in [7] needs more than (mn+2) E; and the OKS protocol in [9] needs more than (2mn+n+1) E. DOKS needs to store with n ciphertexts, while [7], [8] and [9] stores mn ciphertexts.…”
Section: Doks Feasibility Analysismentioning
confidence: 99%
“…In short, DOKS needs to transfer m(n+2)|p| bits, and the total computation is about (2n+6m+1) module exponentiations (E) and m(n+1) module multiplications (M), while the OKS protocol in [7] needs more than (mn+2) E; and the OKS protocol in [9] needs more than (2mn+n+1) E. DOKS needs to store with n ciphertexts, while [7], [8] and [9] stores mn ciphertexts.…”
Section: Doks Feasibility Analysismentioning
confidence: 99%
“…introduced an oblivious keyword search scheme, which makes a user can retrieve data that contain a keyword. Later this scheme is improved by H. S. Rhee [7] .…”
Section: Related Workmentioning
confidence: 99%
“…To resolve this problem, keyword search over encrypted data has received close attention in various environments such as encrypted web hard-systems, intelligent email routing, encrypted vendor systems, etc. (Song et al, 2000;Golle et al, 2004;Ogata and Kurosawa, 2004;Park et al, 2004;Rhee et al, 2006;Boneh and Waters, 2007;Hwang and Lee, 2007;Katz et al, 2008). Keyword search enables a user to search encrypted data without revealing any information on the query and data, even to the database server.…”
Section: Introductionmentioning
confidence: 97%
“…Ogata et al suggested an oblivious keyword search scheme that uses oblivious transfer. The scheme was subsequently improved by Rhee et al (2006). The third type is a store-and-forward system, such as an email system, where a receiver can search data that are encrypted under the receiver's public key on a storage system.…”
Section: Introductionmentioning
confidence: 99%