2018
DOI: 10.1007/978-3-030-03326-2_5
|View full text |Cite
|
Sign up to set email alerts
|

Pattern Matching on Encrypted Streams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
70
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 22 publications
(70 citation statements)
references
References 32 publications
0
70
0
Order By: Relevance
“…To solve this problem, many searchable encryption (SE) techniques have been presented since 2000. SE does not only store users' encrypted data securely but also allows information search over ciphertext [7,8,9,11,12,16,19,22,32].…”
Section: Introduction 11 Backgroundmentioning
confidence: 99%
See 4 more Smart Citations
“…To solve this problem, many searchable encryption (SE) techniques have been presented since 2000. SE does not only store users' encrypted data securely but also allows information search over ciphertext [7,8,9,11,12,16,19,22,32].…”
Section: Introduction 11 Backgroundmentioning
confidence: 99%
“…In SSE, only private key holders can create encrypted data and produce trapdoors for search. In SAE, users who have the public key can make ciphertexts but only private key holders can generate trapdoors [7,8,12,16,32].…”
Section: Introduction 11 Backgroundmentioning
confidence: 99%
See 3 more Smart Citations