DOI: 10.1007/978-3-540-73489-5_2
|View full text |Cite
|
Sign up to set email alerts
|

Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
184
0

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 284 publications
(201 citation statements)
references
References 22 publications
0
184
0
Order By: Relevance
“…This kind of keywords provides flexible search mechanisms to have resultant documents. There are other search mechanisms known as conjunctive keyword search schemes explored in [15], [12], and [13]. These schemes returned the documents that contained all keywords.…”
Section: Related Workmentioning
confidence: 99%
“…This kind of keywords provides flexible search mechanisms to have resultant documents. There are other search mechanisms known as conjunctive keyword search schemes explored in [15], [12], and [13]. These schemes returned the documents that contained all keywords.…”
Section: Related Workmentioning
confidence: 99%
“…Several techniques have been proposed allowing authorised users to perform efficient queries on the encrypted data while not revealing information on the data and the query [33,7,15,10,18,8,35,5,28,32,14]. However, these techniques do not support the case of users having different access rights over the protected data.…”
Section: Related Workmentioning
confidence: 99%
“…Park in [4] reduced the query token size into a constant and made the computation time of query operations in constant complexity. Further, some of previous papers proposed variety of query types which support not only equality query but also conjunction query to make the method more practical [5]. Byun and Lee [6] defined a security model for conjunctive keyword search on a practical relational database.…”
Section: Introductionmentioning
confidence: 99%