2017 ISEA Asia Security and Privacy (ISEASP) 2017
DOI: 10.1109/iseasp.2017.7976986
|View full text |Cite
|
Sign up to set email alerts
|

A2BSE: Anonymous attribute based searchable encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…|G|, |G T |, and Z p are bit lengths required to store an element in the respective finite group. Our theoretical storage costs are similar to the MABKS [17] scheme. However, our scheme has lower constant terms and has little relevance to the user attribute size.…”
Section: Setupmentioning
confidence: 69%
See 1 more Smart Citation
“…|G|, |G T |, and Z p are bit lengths required to store an element in the respective finite group. Our theoretical storage costs are similar to the MABKS [17] scheme. However, our scheme has lower constant terms and has little relevance to the user attribute size.…”
Section: Setupmentioning
confidence: 69%
“…Many searchable attribute-based encryption schemes (ABS) [16][17][18][19][20][21][22][23][24] have provided fine-grained access control, dynamic updates, and attribute revocations. However, searching capabilities could be more potent in most schemes to fulfill actual needs.…”
Section: Introduction 1motivationsmentioning
confidence: 99%