2008
DOI: 10.1007/978-3-540-89641-8_13
|View full text |Cite
|
Sign up to set email alerts
|

Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
32
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 63 publications
(39 citation statements)
references
References 13 publications
0
32
0
Order By: Relevance
“…Boneh and Waters have given a generalized scheme [29] for conjunction as well as for subset queries. Later on, a scheme with a refined form of a token (that is independent of specifying the keyword field position) is devised by Wang et al [13]. Subsequently, B. Zhang and F. Zhang [21] have improved the security flaws of [13] and defined a conjunctive-subset keyword search.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Boneh and Waters have given a generalized scheme [29] for conjunction as well as for subset queries. Later on, a scheme with a refined form of a token (that is independent of specifying the keyword field position) is devised by Wang et al [13]. Subsequently, B. Zhang and F. Zhang [21] have improved the security flaws of [13] and defined a conjunctive-subset keyword search.…”
Section: Related Workmentioning
confidence: 99%
“…Later on, a scheme with a refined form of a token (that is independent of specifying the keyword field position) is devised by Wang et al [13]. Subsequently, B. Zhang and F. Zhang [21] have improved the security flaws of [13] and defined a conjunctive-subset keyword search. Other efficient constructions with the support of conjunctive keyword search operation are given in [22,23,30].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…These schemes cannot support dynamic groups, while Park et al [3] firstly proposed search schemes of dynamic groups, and their search schemes deal with membership changes without reencrypting documents for each change of membership. Later, Wang et al [15] built conjunctive keyword searches on encrypted data without keyword fields, and they applied these searches to the setting of dynamic groups.…”
Section: Related Workmentioning
confidence: 99%