2022
DOI: 10.1186/s13677-022-00287-5
|View full text |Cite
|
Sign up to set email alerts
|

An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability

Abstract: In the cloud, users prefer to store their sensitive data in encrypted form. Searching keywords over encrypted data without loss of data confidentiality is an important issue. In 2004, Boneh et al. proposed the first public-key searchable encryption scheme which allows users to search by the private key. However, most existing public-key searchable encryption schemes are vulnerable to keyword guessing attack and can not satisfy multi-ciphertext indistinguishability. In this paper, we construct a secure designat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…Guo et al [18] analyse the scheme of Li et al [19] and demonstrate that its Trapdoor indistinguishability is not satisfied. A security scheme that satisfies the requirements of the test-specified server and provides stronger security guarantees for the confidentiality of keywords is also proposed.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Guo et al [18] analyse the scheme of Li et al [19] and demonstrate that its Trapdoor indistinguishability is not satisfied. A security scheme that satisfies the requirements of the test-specified server and provides stronger security guarantees for the confidentiality of keywords is also proposed.…”
Section: Related Workmentioning
confidence: 99%
“…There are four situations that need to be determined during the update: 1. When the keyword corresponding to the updated document does not exist (line [8][9][10][11][12][13][14][15][16][17][18]. At this point, you need to initialize the keyword and its files, and update the ABF; 2, when the keyword exists, and the corresponding first document is the target document (line 20-28).…”
Section: Algorithm 6 Updatementioning
confidence: 99%
“…Guo et al [17] analyze the scheme of Li et al [18] and demonstrate that its trapdoor indistinguishability is not satisfied. A security scheme that satisfies the requirements of the test-specified server and provides stronger security guarantees for the confidentiality of keywords is also proposed.…”
Section: Related Workmentioning
confidence: 99%
“…When the keyword corresponding to the updated document does not exist (line [8][9][10][11][12][13][14][15][16][17][18]. At this point, you need to initialize the keyword and its files and update the ABF;…”
mentioning
confidence: 99%