2020
DOI: 10.3390/cryptography4040028
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud

Abstract: In the area of searchable encryption, public key encryption with keyword search (PEKS) has been a critically important and promising technique which provides secure search over encrypted data in cloud computing. PEKS can protect user data privacy without affecting the usage of the data stored in the untrusted cloud server environment. However, most of the existing PEKS schemes concentrate on data users’ rich search functionalities, regardless of their search permission. Attribute-based encryption technology is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(18 citation statements)
references
References 29 publications
0
18
0
Order By: Relevance
“…Subsequently, in 2020, Zhou et al. [32] improved Yin’s work, making the efficiency of the scheme further improved. In the same year, in order to improve the accuracy of the search and the verifiability of the results, Cao et al.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Subsequently, in 2020, Zhou et al. [32] improved Yin’s work, making the efficiency of the scheme further improved. In the same year, in order to improve the accuracy of the search and the verifiability of the results, Cao et al.…”
Section: Related Workmentioning
confidence: 99%
“…Some representative attribute-based searchable encryption schemes are selected for comparison in Table 1 . It can be seen from Table 2 , compared with the schemes in the literature [30] and [32] , it can be found that only some of the schemes in the comparative literature can realize the collaborative search of users within the same group. In contrast, our proposed scheme can realize the collaborative search function of users within the same group on translation nodes with more vital access control function, which makes the scheme in this paper more practical.…”
Section: Performance Analysismentioning
confidence: 99%
“…Sensitive data can be encrypted before being transferred to the cloud to mitigate this issue. We can save the encrypted medical data in the cloud to prevent patient information from being leaked and later can be used in processing after decryption [ 36 ]. We used a standard public key encryption method in which the data is encrypted using the public key method but only owner can decrypt the data with his/her private key.…”
Section: Problem Statementmentioning
confidence: 99%
“…For example, Vaanchig et al [20] proposed a temporary and fuzzy keyword search public key encryption scheme, which can resist keyword guessing attacks and limit data retrieval time, thus enhancing the security of keyword search. Zhou et al [21] proposed a public key encryption scheme, in which CP-ABE technology is used for fine-grained access control and keyword search of encrypted data.…”
Section: Related Workmentioning
confidence: 99%