2016
DOI: 10.1109/tc.2015.2389959
|View full text |Cite
|
Sign up to set email alerts
|

Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
234
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 161 publications
(238 citation statements)
references
References 20 publications
3
234
0
1
Order By: Relevance
“…Secondly, the trapdoor size is linear in the number of files. Cui et al [15] adapt the idea in [14] and propose a keyaggregate searchable encryption scheme. In their scheme, a data owner provides a single aggregated key that contains information about all files that a user is authorized to search.…”
Section: Our Contributions Our Contributions Are As Followsmentioning
confidence: 99%
See 2 more Smart Citations
“…Secondly, the trapdoor size is linear in the number of files. Cui et al [15] adapt the idea in [14] and propose a keyaggregate searchable encryption scheme. In their scheme, a data owner provides a single aggregated key that contains information about all files that a user is authorized to search.…”
Section: Our Contributions Our Contributions Are As Followsmentioning
confidence: 99%
“…A.1 Vulnerability of the Scheme in [15] Cui et al [15] proposed a scheme that provides an aggregation method on files for a user. Basically, each user's secret key is mapped to an aggregated number of files.…”
Section: A Appendixmentioning
confidence: 99%
See 1 more Smart Citation
“…The said need for secure storage, communication and computational complexity makes such a system impractical and inefficient. Baojiang Cui, Zheli Liu, and Lingyu Wang el at [1] proposed concept of key-aggregate searchable encryption to tackle these challenges. The proposed KASE system can be applied to any storage on cloud that have the functionality of group data sharing and searching, which means that any selected group of files may selectively shared with a group of selected users by any user, while allowing to perform keyword search over the data.…”
Section: Review Of Literaturementioning
confidence: 99%
“…A spammer does not need to get permissions from recipients when sending spam, which causes serious annoyance to people and even leads to information security risks [2]. If a recipient clicks a malicious link in the spam message, their personal information may be automatically sent to the spammer via a malicious program, which is an obvious challenge for privacy protection [3,4]. Statistics showed that spam accounted for 81.8% of total emails in 2016, compared with 72.9% in 2015 [5], which is obviously an increasing threat to email users.…”
Section: Introductionmentioning
confidence: 99%