2014
DOI: 10.1016/j.future.2013.09.013
|View full text |Cite
|
Sign up to set email alerts
|

A general transformation from KP-ABE to searchable encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 61 publications
(33 citation statements)
references
References 12 publications
0
33
0
Order By: Relevance
“…It also requires a secure channel and supports the receiver private verification. After this work, many researchers proposed attribute-based encryption with keyword search schemes [22,23].…”
Section: Related Workmentioning
confidence: 99%
“…It also requires a secure channel and supports the receiver private verification. After this work, many researchers proposed attribute-based encryption with keyword search schemes [22,23].…”
Section: Related Workmentioning
confidence: 99%
“…Han et al in [15] proposed an attribute-based searchable encryption with key policy. Their scheme achieves flexible access control on the search indexes of ciphertext.…”
Section: Attribute-based Abstractearchmentioning
confidence: 99%
“…To better satisfy this demand, Sahai et al presented attribute-based encryption (ABE) [10][11][12] which efficiently brings flexible access control. Researchers have also taken the advantages of ABE [13,14] and keyword search to present attribute-based keyword search schemes [15][16][17][18]. Until now, several schemes have achieved keyword search based on ABE, but the performance can still be further optimized.…”
Section: Introductionmentioning
confidence: 99%
“…In their turn, all of Fu, Z., et al [24], have also proposed the application of a deterministic algorithm for encryption with the aim of keywords' encryption, as well as using stream ciphers so as to carry out security post-encrypt keywords. Furthermore, Han, F., et al [25], gave their proposal of a new technique for transforming the Key-Policy Attribute-Based Encryption (KP-ABE) to be Attribute-Based Encryption instead using the feature of Keyword Search (ABEKS). In order to render transformation feasible, the researchers were keen on defining the feature of weak anonymity, which is known as attribute privacy that is also incurring slight computational transparency.…”
Section: Related Workmentioning
confidence: 99%