2021
DOI: 10.1109/tsc.2019.2910113
|View full text |Cite
|
Sign up to set email alerts
|

Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 59 publications
(19 citation statements)
references
References 58 publications
1
18
0
Order By: Relevance
“…But most of them failed to consider the balance between the cost, implementation, and level of security. Some researchers [18,26,34] support the idea that main contributions should present adaptive security frameworks that withstand all known attacks and guarantee excellent performances (with low interference with data collection performances), lowcost, and efficient protection. It is to undertake cross-data platform challenges to meet the requirements of society.…”
Section: Metrics and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…But most of them failed to consider the balance between the cost, implementation, and level of security. Some researchers [18,26,34] support the idea that main contributions should present adaptive security frameworks that withstand all known attacks and guarantee excellent performances (with low interference with data collection performances), lowcost, and efficient protection. It is to undertake cross-data platform challenges to meet the requirements of society.…”
Section: Metrics and Discussionmentioning
confidence: 99%
“…The growth of huge-volume datasets and the intensive data analytics applications caused a significant challenge for privacy preservation techniques [13,26,29,30]. Personal data protection manages the relations between users and the information community, which collects personal data.…”
Section: Introductionmentioning
confidence: 99%
“…Upon receipt of the user's token, the server can perform the keyword retrieval operations and returns the related search results. Since this seminal work, many researchers have made great efforts [27][28][29][30][31][32][33][34][35] and proposed a series of searchable encryption proposals to make them more efficient and enrich the search diversified, for example, fuzzy search [36][37][38], conjunctive search [39][40][41], and ranked search [42][43][44].…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, scholars try to attack SSE schemes with some degree of information leakage [14][15][16][17][18][19][20][21]. In order to make searchable encryption more suitable for the needs of reality, the literatures [53][54][55][56][57] have studied various searchable encryption schemes. Li et al [54] presented an attributebased encryption scheme with outsourcing key issuing and outsourcing decryption, which can implement keyword search function.…”
Section: B Related Workmentioning
confidence: 99%
“…Lu et al [56] developed a privacypreserving and pairing-free multi-recipient certificateless encryption with keyword search scheme for the cloudassisted industrial internet of things. Lu et al [57] devised a certificate-based searchable encryption scheme, which not only provided resistance to the keyword guessing attack, but also had advantages such as implicit authentication, no key escrow and no secure channel. Blockchain-based keyword search.…”
Section: B Related Workmentioning
confidence: 99%