2019
DOI: 10.1007/978-3-030-37352-8_34
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Attribute-Based Multi-keyword Search Encryption Scheme with User Tracing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…In their construction, it not only offers multikeyword search but also can be applied to multiowner settings. On the other hand, Liu et al [23] presented a new improved scheme with user tracing using the AND-gate on the multivalue attribute. Although these above schemes support multikeyword search, it cannot be applied to scenarios where multiple owners could be shared.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In their construction, it not only offers multikeyword search but also can be applied to multiowner settings. On the other hand, Liu et al [23] presented a new improved scheme with user tracing using the AND-gate on the multivalue attribute. Although these above schemes support multikeyword search, it cannot be applied to scenarios where multiple owners could be shared.…”
Section: Related Workmentioning
confidence: 99%
“…e existing ABKS schemes [15][16][17][18][19][20] only support single keyword search functions, while it requires massive computational and broadband resources as this retrieval mode returns a lot of irrelevant results. e method to achieve multikeyword search [21][22][23] was introduced to alleviate the issues.…”
Section: Introductionmentioning
confidence: 99%
“…However, Sun et al [42] pointed out that four types of KGA exist in this scheme. To achieve hidden policy and traceability simultaneously, Liu et al [43] presented a privacy-preserving ABKS with user tracing. However, the security proof cannot ensure the policy hiding property due to its flawed security model.…”
Section: 22mentioning
confidence: 99%
“…However, the security proof cannot ensure the policy hiding property due to its flawed security model. Unlike with the formal security model in hidden policy CP-ABKS [18,41], the security model in [43] only shows the indistinguishability of keywords and does not consider the indistinguishability of access policies.…”
Section: 22mentioning
confidence: 99%