SOFSEM 2008: Theory and Practice of Computer Science
DOI: 10.1007/978-3-540-77566-9_56
|View full text |Cite
|
Sign up to set email alerts
|

Threshold Privacy Preserving Keyword Searches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 35 publications
(29 citation statements)
references
References 8 publications
0
28
0
Order By: Relevance
“…We find that both schemes [10,13] are limited to a fixed number of users and fixed threshold value at the key generation stage. It makes adding or removing a user impossible, and changing the threshold value for individual ciphertext impossible.…”
Section: Related Workmentioning
confidence: 96%
See 3 more Smart Citations
“…We find that both schemes [10,13] are limited to a fixed number of users and fixed threshold value at the key generation stage. It makes adding or removing a user impossible, and changing the threshold value for individual ciphertext impossible.…”
Section: Related Workmentioning
confidence: 96%
“…Wang et al [13] decentralised the ability of trapdoor generation to multi-user in a threshold manner, which requires at least k of n users to generate the trapdoor. Siad [10] gave a formal definition of threshold public key encryption with keyword search (TPEKS), and generically constructed a TPEKS scheme with threshold (n, t)-IBE but no concrete scheme is provided.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Several techniques have been proposed allowing authorised users to perform efficient queries on the encrypted data while not revealing information on the data and the query [33,7,15,10,18,8,35,5,28,32,14]. However, these techniques do not support the case of users having different access rights over the protected data.…”
Section: Related Workmentioning
confidence: 99%