2018 14th International Conference on Computational Intelligence and Security (CIS) 2018
DOI: 10.1109/cis2018.2018.00100
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable and Authenticated Searchable Encryption Scheme with Aggregate Key in Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
63
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(63 citation statements)
references
References 13 publications
0
63
0
Order By: Relevance
“…The constant size of the aggregate key makes the KASE scheme more suitable for devices having limited storage resources, such as smart cards, IoT sensors. However, the existing KASE schemes [4,13,[18][19][20][21]31] use two pairing operations to generate a keyword ciphertext for each keyword to be attached with the document. Similarly, for decryption of ciphertext pairing operations are required.…”
Section: Motivationmentioning
confidence: 99%
See 4 more Smart Citations
“…The constant size of the aggregate key makes the KASE scheme more suitable for devices having limited storage resources, such as smart cards, IoT sensors. However, the existing KASE schemes [4,13,[18][19][20][21]31] use two pairing operations to generate a keyword ciphertext for each keyword to be attached with the document. Similarly, for decryption of ciphertext pairing operations are required.…”
Section: Motivationmentioning
confidence: 99%
“…The authors of [25] show that for different security levels (i.e., for 80 bits, 112 bits and 128 bits) and prime order groups, the pairing operation (on random group elements) requires significantly more time and power resource as compared to the group exponentiation (of a random group element with a random exponent) and multiplication operation. Therefore, the limited power resource of sensor nodes in IoT deployment does not support the expensive computational cost of the existing KASE schemes [4,13,[18][19][20][21]31]. The expensive computational cost of encryption and decryption phases make the existing KASE [4,13,[18][19][20][21]31] schemes infeasible to use in power-constrained devices.…”
Section: Motivationmentioning
confidence: 99%
See 3 more Smart Citations