2020
DOI: 10.1007/s13369-019-04302-x
|View full text |Cite
|
Sign up to set email alerts
|

CRSQ-KASE: Key Aggregate Searchable Encryption Supporting Conjunctive Range and Sort Query on Multi-owner Encrypted Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
27
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 11 publications
(27 citation statements)
references
References 31 publications
0
27
0
Order By: Relevance
“…2|G| Table 5, we can observe that none of the existing KASE schemes listed in the table provide revocation of delegated rights, conjunctive keywords search using a single trapdoor and energy-efficient encryption as well as decryption algorithms for resource-limited devices. Additionally, as shown in Table 5, the KASE schemes [4,13,23,24,31,32,34,35] do not support search over multiowners' data using a single trapdoor. On the other hand, the KASE schemes proposed in [18][19][20][21][22] provide the solution to search over multi-owners' data using a single trapdoor.…”
Section: Evaluation Of Kase Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…2|G| Table 5, we can observe that none of the existing KASE schemes listed in the table provide revocation of delegated rights, conjunctive keywords search using a single trapdoor and energy-efficient encryption as well as decryption algorithms for resource-limited devices. Additionally, as shown in Table 5, the KASE schemes [4,13,23,24,31,32,34,35] do not support search over multiowners' data using a single trapdoor. On the other hand, the KASE schemes proposed in [18][19][20][21][22] provide the solution to search over multi-owners' data using a single trapdoor.…”
Section: Evaluation Of Kase Schemesmentioning
confidence: 99%
“…The KASE [23] scheme provides a mechanism that can handle emergency situations where no authorized user exists to perform (or to delegate) a time-critical task. The KASE scheme proposed in [24] supports the conjunctive range and sort query on the encrypted dataset and enhances the query expressiveness of the existing KASE [4, 13, 18-22, 32, 34, 35] schemes. As compared to the previous solutions, the KASE [24] scheme supports multi-dimensional, multi-keyword searches on the encrypted dataset using a single trapdoor.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The key aggregate searchable encryption (KASE) scheme [5 ] is more extended in scope, in which a DO delegates search rights over a selected dataset using an aggregate key and the user can search over shared data by submitting a single aggregate trapdoor to the cloud. The KAE schemes [4, 6–11 ] and KASE schemes [5, 12–23 ] focus on the list of data that the DO wants to share with other users rather than focusing on the role or the attributes of recipients. This data‐centric characteristic of the KAE and the KASE helps them to reduce the number of keys required for group data sharing, as compared to the user‐centric data sharing schemes [1–3 ].…”
Section: Introductionmentioning
confidence: 99%
“…This data‐centric characteristic of the KAE and the KASE helps them to reduce the number of keys required for group data sharing, as compared to the user‐centric data sharing schemes [1–3 ]. Despite the advantage of the secure delegation of search rights using a constant size key, the KASE schemes [5, 12–23 ] also bring the security issues and challenges.…”
Section: Introductionmentioning
confidence: 99%