2013
DOI: 10.1007/978-3-319-03584-0_28
|View full text |Cite
|
Sign up to set email alerts
|

A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
40
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 63 publications
(40 citation statements)
references
References 14 publications
0
40
0
Order By: Relevance
“…To grant multiple users the search capabilities and access privileges, user authorization should be enforced. Therefore, the authors of [34] proposed a searchable CP-ABE scheme. In their scheme data owner encrypts the sensitive data under an access policy before outsourcing sensitive data in the public cloud and builds a corresponding secure index for keywords.…”
Section: Related Workmentioning
confidence: 99%
“…To grant multiple users the search capabilities and access privileges, user authorization should be enforced. Therefore, the authors of [34] proposed a searchable CP-ABE scheme. In their scheme data owner encrypts the sensitive data under an access policy before outsourcing sensitive data in the public cloud and builds a corresponding secure index for keywords.…”
Section: Related Workmentioning
confidence: 99%
“…EFFICIENCY In this section, we compare the efficiency of our schemes with the schemes in [3] and [5]. Our basic scheme is as efficient as the improved scheme, except the generation of SK and the decryption in KP-ABE (which are similar to those of [3] and [5] under the same search policy). This is because that the main difference between our basic and improved schemes is that we apply different KP-ABE schemes to build the secure index.…”
Section: The Attribute Authority Chooses T ∈ Z P Randomly and Computesmentioning
confidence: 99%
“…This is because that the main difference between our basic and improved schemes is that we apply different KP-ABE schemes to build the secure index. Therefore, we mainly compare the efficiency of our improved scheme with the schemes in [3] and [5]. Further, since the schemes in [3] and [5] do not support data access control, we will not consider the cost of data encryption and decryption in our comparison result.…”
Section: The Attribute Authority Chooses T ∈ Z P Randomly and Computesmentioning
confidence: 99%
See 2 more Smart Citations