2010
DOI: 10.1007/978-3-642-17373-8_33
|View full text |Cite
|
Sign up to set email alerts
|

Structured Encryption and Controlled Disclosure

Abstract: We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we introduce the notion of structured encryption which generalizes previous work on symmetric searchable encryption (SSE) to the setting of arbitrarily-structured data. In the context of cloud storage, structured encryption allows a client to encrypt data without losing the ability to query and retrieve it efficiently. Another applicatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
261
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 356 publications
(290 citation statements)
references
References 30 publications
1
261
0
Order By: Relevance
“…Definition 6 explains the concept of CKA2-security from [10,11], which has been considered as "state of the art". …”
Section: Definition 5 (Group Pattern) the Group Pattern Over An N-qumentioning
confidence: 99%
See 1 more Smart Citation
“…Definition 6 explains the concept of CKA2-security from [10,11], which has been considered as "state of the art". …”
Section: Definition 5 (Group Pattern) the Group Pattern Over An N-qumentioning
confidence: 99%
“…We analyze the security of GBC under the "state of the art" security definition from [10,11] (as defined in Section 3). The CKA2-security is parametrized by a leakage function L, which is assumed to be leaked to an adversary.…”
Section: Appendix a Security Proof Of Gbcmentioning
confidence: 99%
“…A scheme achieving sublinear search time using inverted index was also proposed. Most of the subsequent SSE schemes, such as schemes in [5,[20][21][22][23][24][25][26][27] adopted or extended the model proposed by Curtmola et al [19]. All these schemes are based on a single server.…”
Section: Searchable Symmetric Encryption (Sse)mentioning
confidence: 99%
“…Similarly, our reputation path discovery scheme is run recursively, in which each node will update his/her friend list to the CS continuously. We first apply the structured encryption [12] together with the proxy re-encryption for both the enquiry of neighbor nodes in an encrypted manner and update friend list without disclosing the detail to the server. Apart from these operations, we also design the new user grant and user revocation in an efficient and secure way.…”
Section: A Main Ideamentioning
confidence: 99%