2018
DOI: 10.1007/s10623-018-0489-y
|View full text |Cite
|
Sign up to set email alerts
|

Publicly verifiable searchable symmetric encryption based on efficient cryptographic components

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 12 publications
0
12
0
Order By: Relevance
“…Subsequently, several SSE schemes were proposed for improvement. For example, Cash et al [ 16 ] proposed an SSE scheme that supports conjunctive search and general Boolean queries on outsourced symmetrically encrypted data; Salam et al [ 17 ] proposed a privacy-preserving data storage and retrieval system in cloud computing; Li et al [ 18 ] proposed three different SSE schemes that can guard against a coercer by using the deniable encryption idea; Soleimanian et al [ 19 ] proposed an SSE scheme to be publicly verifiable.…”
Section: Related Workmentioning
confidence: 99%
“…Subsequently, several SSE schemes were proposed for improvement. For example, Cash et al [ 16 ] proposed an SSE scheme that supports conjunctive search and general Boolean queries on outsourced symmetrically encrypted data; Salam et al [ 17 ] proposed a privacy-preserving data storage and retrieval system in cloud computing; Li et al [ 18 ] proposed three different SSE schemes that can guard against a coercer by using the deniable encryption idea; Soleimanian et al [ 19 ] proposed an SSE scheme to be publicly verifiable.…”
Section: Related Workmentioning
confidence: 99%
“…While UC-security is stronger than CKA2-security, their construction requires a linear search time. Soleimanian et al [15] presented a public VSSE scheme, which delegates a third party to accomplish the verification, but fails to support dynamic operations. The subsequent work of Kurosawa et.al [16] extends VSSE to a dynamic environment.…”
Section: Related Workmentioning
confidence: 99%
“…Besides, the file contents can also be tampered. Verifiable Searchable Encryption(VSE) [37] has been proposed to address these issues. Zhu et al [38] proposed the first generic VSE in multi-user mode.…”
Section: Related Workmentioning
confidence: 99%