2023
DOI: 10.3390/cryptography7020028
|View full text |Cite
|
Sign up to set email alerts
|

Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based Encryption Schemes

Abstract: Currently, cloud computing has become increasingly popular and thus, many people and institutions choose to put their data into the cloud instead of local environments. Given the massive amount of data and the fidelity of cloud servers, adequate security protection and efficient retrieval mechanisms for stored data have become critical problems. Attribute-based encryption brings the ability of fine-grained access control and can achieve a direct encrypted data search while being combined with searchable encryp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…The evolution from single-keyword searches to multi-keyword searches has been accompanied by efforts to reduce computational overhead, increase efficiency, and enhance security. Research in this area includes the combination of multi-keyword searches with fuzzy and semantic searches, ranked searchable Attribute-Based Encryption (FEMRSABE), and access control in a cloud environment maintaining encrypted data (MRSF) [6,23,24].…”
Section: Multiple Abstractearches G Searching Graphsmentioning
confidence: 99%
See 3 more Smart Citations
“…The evolution from single-keyword searches to multi-keyword searches has been accompanied by efforts to reduce computational overhead, increase efficiency, and enhance security. Research in this area includes the combination of multi-keyword searches with fuzzy and semantic searches, ranked searchable Attribute-Based Encryption (FEMRSABE), and access control in a cloud environment maintaining encrypted data (MRSF) [6,23,24].…”
Section: Multiple Abstractearches G Searching Graphsmentioning
confidence: 99%
“…When a document is needed, a search token with a keyword is sent to the cloud provider, which uses it to locate and retrieve the document [30]. Another approach involves building a "Secure Index" by extracting keywords from plaintext files, encrypting the plaintext with symmetric encryption, transforming keywords into trapdoors, and matching an authorized user's trapdoor to the Secure Index for search results [23].…”
Section: Indexesmentioning
confidence: 99%
See 2 more Smart Citations