2015
DOI: 10.1002/cpe.3608
|View full text |Cite
|
Sign up to set email alerts
|

Revocable and anonymous searchable encryption in multi‐user setting

Abstract: SUMMARYWith powerful storage and computing capacities provided by cloud server provider(CSP), cloud customers can relieve from heavy storage and maintenance burden in cloud computing. Therefore, searchable encryption(SE) technology becomes a fundamental solution to search over encrypted data in outsourcing service. However, the genuine safety of SE schemes should concentrate not only on keyword privacy but also on user privacy as information tracking may leak user identity. For example, in the personal health … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 36 publications
(51 reference statements)
0
6
0
Order By: Relevance
“…To address this issue, public key encryption with keyword search was proposed [6]. Since then, many different SE schemes were proposed to enrich distinct features such as single keyword search [7,8], multiple keyword search [9,10] and fuzzy keyword search [11,12]. However, the abovementioned SE schemes with different features do not support data owner to grant the search capability to multiple data users.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To address this issue, public key encryption with keyword search was proposed [6]. Since then, many different SE schemes were proposed to enrich distinct features such as single keyword search [7,8], multiple keyword search [9,10] and fuzzy keyword search [11,12]. However, the abovementioned SE schemes with different features do not support data owner to grant the search capability to multiple data users.…”
Section: Related Workmentioning
confidence: 99%
“…To resolve the issue of efficient searching over the encrypted medical data, the searchable encryption (SE) technique [5,6], which allows users to delegate their searchability to cloud server for securely and selectively retrieving the encrypted medical data of interest, has been extensively researched. At present, a lot of work focusing on SE has been explored to gain various searching functionalities like single 2 Wireless Communications and Mobile Computing keyword search [7,8], multikeyword search [9,10], fuzzy keyword search [11,12], and so on. Although much attention in SE technology has been attracted in both academical and industrial fields, it is still unsuitable for WBANs as patients commonly desire that their medical data could be shareable and accessible by different data users (e.g., government agencies, healthcare providers, medical researchers, and insurance underwriters).…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, most of the existing searchable encryption schemes cannot preserve keyword privacy and user privacy in multi‐user setting simultaneously. For this end, in the 10th paper, ‘Revocable and Anonymous Searchable Encryption in Multi‐user Setting’ , Miao et al designed a secure and scalable cryptographic primitive based on identity‐based encryption. As a further contribution, this proposed scheme can effectively resist decryption key exposure threat and achieve anonymous‐revocable‐ID‐chosen plaintext attack (CPA) secure in the standard model.…”
Section: This Special Issuementioning
confidence: 99%
“…Over these years, considerable amount of SE schemes enriched with various functionalities have been put forth in different settings. To the best of our knowledge, most of the existing SE schemes mainly focus on improving the efficiency and security, while few work concentrates on CSP reliability. Because Song et al proposed the first symmetric key‐based scheme for retrieving encrypted data, vast subsequent SE schemes have been proposed to support multi‐keyword search through using vector space model, edit distance, or multi‐way trie‐tree.…”
Section: Related Workmentioning
confidence: 99%