Encyclopedia of Cryptography and Security 2011
DOI: 10.1007/978-1-4419-5906-5_914
|View full text |Cite
|
Sign up to set email alerts
|

Search over Encrypted Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…Of course, so one approach incurs in huge communications and computations overhead and is completely inefficient. Searchable encryption (SE) [1] has been the most known approach to cope with the problem of searching over encrypted data stored in untrusted servers. SE is defined as the ability to identify and retrieve a set of objects from an encrypted collection that satisfy a query.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Of course, so one approach incurs in huge communications and computations overhead and is completely inefficient. Searchable encryption (SE) [1] has been the most known approach to cope with the problem of searching over encrypted data stored in untrusted servers. SE is defined as the ability to identify and retrieve a set of objects from an encrypted collection that satisfy a query.…”
Section: Introductionmentioning
confidence: 99%
“…1) DO creates cryptographic keys { 1 , 2 , 3 } with security strength ; 2) Given a set of documents , DO extracts representative keywords in ; 3) DO encrypts with a symmetric cipher using key 1 ( 1 ( )); 4) DO creates a secure index from , using key 2 ( 2 ( )); 5) DO uploads 1 ( ) and 2 ( ) to the cloud; 6) DO gives authorization to some DUs to search over its data, using 3 . 7) DU generates trapdoors for a given query word in using 3 , 3 ( ); 8) DU queries the CSP using 3 ( ), to retrieve ′ documents containing .…”
Section: Introductionmentioning
confidence: 99%
“…Another approach is pre‐encryption, which encrypts users' information before it is uploaded to a cloud server . This approach is the most effective solution from the view point of information hiding from malicious administrators, if properly implemented and carried out.…”
Section: Introductionmentioning
confidence: 99%