2017
DOI: 10.1109/tsc.2016.2542813
|View full text |Cite
|
Sign up to set email alerts
|

KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
175
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 275 publications
(175 citation statements)
references
References 23 publications
0
175
0
Order By: Relevance
“…Fan et al proposed to quantify privacy leakage of software from four metrics (possibility, severity, crypticity, and manipulability) and further composited these four metrics into a comprehensive metric. Besides, the development of information encryption technology provide privacy and security for data communication on the network . Freudiger et al proposed a method of quantifying location privacy in an external anonymity updating, then through the two‐step non‐cooperative game model to dynamically adjust mix‐zones and improve the privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Fan et al proposed to quantify privacy leakage of software from four metrics (possibility, severity, crypticity, and manipulability) and further composited these four metrics into a comprehensive metric. Besides, the development of information encryption technology provide privacy and security for data communication on the network . Freudiger et al proposed a method of quantifying location privacy in an external anonymity updating, then through the two‐step non‐cooperative game model to dynamically adjust mix‐zones and improve the privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Unlike in asymmetric settings, securely encapsulating a single keyword/index is nearly trivial in symmetric settings. In these schemes and subsequent work [8][9][10][11], researchers focus on how to handle full text indices and try to improve efficiency. Another line of work uses deterministic encryption [8,12].…”
Section: Related Workmentioning
confidence: 99%
“…However, in the constructed access tree, each leaf node indicates that the keyword‐related attributes are exposed to a semitrusted cloud storage server. Li et al proposed the outsourced attribute‐based encryption with keyword search function outsourced ABE (KSF‐OABE) scheme. It introduced 3 cloud storage servers that are used to store data, generate keywords, and partially decrypt operations.…”
Section: Introductionmentioning
confidence: 99%
“…Although it finally assigns a large number of decryption calculations to the offline part, the relative two times encryption and decryption greatly increases the computational overhead. However, the access attributes in previous works are too transmitted in plaintext. An attribute‐keyword based data publish‐subscribe (AKPS) scheme is used to realize the privacy protection of data publish and subscribe, but the access attributes of the users is not blinded, it can cause the collusion attacks of the CSS and the users.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation