2007
DOI: 10.1007/978-3-540-75248-6_8
|View full text |Cite
|
Sign up to set email alerts
|

Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
38
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(38 citation statements)
references
References 8 publications
0
38
0
Order By: Relevance
“…MUSE is a recent but active research topic [3,4,11,14,24,25,27,30,31,33]. We note however that despite the obvious risk that the CSP obtains some prior knowledge in a MUSE system through colluding users, only few schemes on MUSE [24,25,27] consider this risk in their security model.…”
Section: Multi-user Searchable Encryptionmentioning
confidence: 99%
See 2 more Smart Citations
“…MUSE is a recent but active research topic [3,4,11,14,24,25,27,30,31,33]. We note however that despite the obvious risk that the CSP obtains some prior knowledge in a MUSE system through colluding users, only few schemes on MUSE [24,25,27] consider this risk in their security model.…”
Section: Multi-user Searchable Encryptionmentioning
confidence: 99%
“…A large number of MUSE schemes [3,4,11,14,24,25,30,31,33] share a common algorithmic structure regarding the application of queries on encrypted indices. In this structure, which we call iterative testing, an encrypted index denoted as C i is built by encrypting each keyword of W i separately.…”
Section: Common Weakness For Many Muse Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…There exist numerous Searchable Encryption schemes for a single user [4][5][6][7][8] as well as for multiple users [9][10][11][12][13]. Practically, any single-user Searchable Encryption scheme can be adapted to define a multiuser Searchable Encryption scheme at the cost of a ciphertext size linear to the number of users in the system.…”
Section: Introductionmentioning
confidence: 99%
“…This ultimately outputs an impractical system with (| | ⋅ ) computational overhead at the Data Owner site and (| | ⋅ ) storage overhead at the server site. As solution, several Searchable Encryption schemes in [9,10,[14][15][16][17][18][19][20] with a builtin support of multiple users are devised in recent years. Amongst them, the scheme proposed by Hwang and Lee [9] is a simple extension of a single-user Searchable Encryption with the ciphertext size (| | + | | ⋅ ), where | | is the number of keywords to be searched.…”
Section: Introductionmentioning
confidence: 99%