2012 32nd International Conference on Distributed Computing Systems Workshops 2012
DOI: 10.1109/icdcsw.2012.89
|View full text |Cite
|
Sign up to set email alerts
|

Phrase Search over Encrypted Data with Symmetric Encryption Scheme

Abstract: We study the case of searching over encrypted data from a remote server. In order to retrieve the encrypted documents that satisfy a client's criteria , a special index must be built and sent by the client together with encrypted documents. A trapdoor will also be produced to offer the privilege to search on the index. In the area of searchable encryption, many works mainly focused on search criteria consisting of a single keyword or conjunctive keywords. Up until now, searching of the exact documents that con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
71
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 38 publications
(71 citation statements)
references
References 8 publications
0
71
0
Order By: Relevance
“…An early construction of phrase queries is due to Tang et al [21]. Their construction operates as a twophase protocol.…”
Section: Previous Workmentioning
confidence: 99%
See 4 more Smart Citations
“…An early construction of phrase queries is due to Tang et al [21]. Their construction operates as a twophase protocol.…”
Section: Previous Workmentioning
confidence: 99%
“…Often times a system that provides security in the presence of adversaries that lie about the number of results are called verifiable. Loosely speaking, their construction combines ideas from [21], which uses essentially a hybrid Merkle tree [15], and [6]. In particular, they replaced the first phase of the scheme of [21] with the verifiable keyword index of [6], and modified the second phase of [21] to include verification.…”
Section: Previous Workmentioning
confidence: 99%
See 3 more Smart Citations