2020
DOI: 10.32604/cmc.2020.011227
|View full text |Cite
|
Sign up to set email alerts
|

Paillier-based Fuzzy Multi-Keyword Searchable Encryption Scheme with Order-Preserving

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…In recent years, to address security concerns caused by various kinds of attacks, such as file-injection attack, Bost et al proposed a dynamic SSE scheme that ensures forward security for the leakage caused by the access pattern [11] and later gave several schemes achieving both forward and backward privacy [12]. In addition to the improvements in efficiency and security mentioned above, much work has been done to extend the functionality of the SSE schemes, including dynamic SSE that supports file additions and deletions [13,14], conjunctive SSE that enables users to search multiple keywords [15,16] and fuzzy SSE [17,18].…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, to address security concerns caused by various kinds of attacks, such as file-injection attack, Bost et al proposed a dynamic SSE scheme that ensures forward security for the leakage caused by the access pattern [11] and later gave several schemes achieving both forward and backward privacy [12]. In addition to the improvements in efficiency and security mentioned above, much work has been done to extend the functionality of the SSE schemes, including dynamic SSE that supports file additions and deletions [13,14], conjunctive SSE that enables users to search multiple keywords [15,16] and fuzzy SSE [17,18].…”
Section: Related Workmentioning
confidence: 99%
“…In the end, the storage server sends the retrieved ciphertexts to the recipient. After the concept of PEKS was put forward, various PEKS schemes and variants have been proposed [8][9][10][11][12][13][14][15][16][17][18][19]. In PEKS, the search tokens need to be conveyed over secure channels to the storage server.…”
Section: Introductionmentioning
confidence: 99%