2016
DOI: 10.1007/978-3-319-45744-4_9
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Encrypted Keyword Search for Multi-user Data Sharing

Abstract: Abstract. In this paper, we provide a secure and e cient encrypted keyword search scheme for multi-user data sharing. Specifically, a data owner outsources a set of encrypted files to an untrusted server, shares it with a set of users, and a user is allowed to search keywords in a subset of files that he is authorized to access. In the proposed scheme, (a) each user has a constant size secret key, (b) each user generates a constant size trapdoor for a keyword without getting any help from any party (e.g., data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

4
74
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 76 publications
(78 citation statements)
references
References 27 publications
4
74
0
Order By: Relevance
“…In contrast, the schemes in [10,[14][15][16] support the dynamic groups of users where joining/leaving a group by a member is entirely controlled by a Data Owner. In addition, the recent schemes in [17][18][19][20] provide Multiuser Searchable Encryption with the notion of Functional Encryption (FE) (Section 2.1) where an Enterprise Trusted Authority (ETA) is responsible for the System Setup and a master public key setup. The most notable characteristic of FE is that a system's master public key is utilized to prepare the searchable ciphertexts and a single ciphertext can serve multiple search tokens (may be issued by different users).…”
Section: Introductionmentioning
confidence: 42%
See 4 more Smart Citations
“…In contrast, the schemes in [10,[14][15][16] support the dynamic groups of users where joining/leaving a group by a member is entirely controlled by a Data Owner. In addition, the recent schemes in [17][18][19][20] provide Multiuser Searchable Encryption with the notion of Functional Encryption (FE) (Section 2.1) where an Enterprise Trusted Authority (ETA) is responsible for the System Setup and a master public key setup. The most notable characteristic of FE is that a system's master public key is utilized to prepare the searchable ciphertexts and a single ciphertext can serve multiple search tokens (may be issued by different users).…”
Section: Introductionmentioning
confidence: 42%
“…Therefore, such FE based searchable schemes can support multiple users in the system with the optimal storagecomputational overhead (i.e., (| |)) for the ciphertexts. Additionally, in the schemes [17][18][19][20], a separate search key (related to the master public key) is issued (either by an ETA or by a Data Owner) to each user. Subsequently, a user constructs a search token with an available search key.…”
Section: Introductionmentioning
confidence: 42%
See 3 more Smart Citations