2007
DOI: 10.1007/978-3-540-77026-8_21
|View full text |Cite
|
Sign up to set email alerts
|

Public Key Encryption with Searchable Keywords Based on Jacobi Symbols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 78 publications
(42 citation statements)
references
References 8 publications
0
42
0
Order By: Relevance
“…Anonymity is a useful property in many applications, such as fully private communication [7] and searching on encrypted data [11,1]. While there are a few anonymous (non-hierarchical) IBEs [12,20,13,25], only one other HIBE is known to be anonymous [15].…”
Section: Our Resultsmentioning
confidence: 99%
“…Anonymity is a useful property in many applications, such as fully private communication [7] and searching on encrypted data [11,1]. While there are a few anonymous (non-hierarchical) IBEs [12,20,13,25], only one other HIBE is known to be anonymous [15].…”
Section: Our Resultsmentioning
confidence: 99%
“…Due to the computationally intensive primitives used in the algorithms in public-key searchable encryption schemes, they might not be suitable for use in scenarios where a high frequency of queries are issued to the server. The schemes of [27][28][29] do not use group operations or pairings in their Query algorithms. They use hash functions [28,29] and polynomial evaluation [27].…”
Section: Scenario 2: Data Owner Can Read Data All Users Can Write Datamentioning
confidence: 99%
“…The schemes of [27][28][29] do not use group operations or pairings in their Query algorithms. They use hash functions [28,29] and polynomial evaluation [27].…”
Section: Scenario 2: Data Owner Can Read Data All Users Can Write Datamentioning
confidence: 99%
“…There are two approaches to the searchable encryption. The first approach is to use symmetric encryption [17,18], whereas the second approach for is to use asymmetric encryption [19,20,21].…”
Section: Searchable Encryptionmentioning
confidence: 99%