2018
DOI: 10.1016/j.future.2017.02.024
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable searchable encryption with aggregate keys for data sharing system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
152
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 110 publications
(152 citation statements)
references
References 24 publications
0
152
0
Order By: Relevance
“…Cuckoo hash table is used here for this private verifiable scheme. With multiowner setting, Liu et al [12] have presented a VSSE with aggregate keys. Miao et al [15] presented a VSSE in same multi-owner setting.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Cuckoo hash table is used here for this private verifiable scheme. With multiowner setting, Liu et al [12] have presented a VSSE with aggregate keys. Miao et al [15] presented a VSSE in same multi-owner setting.…”
Section: Related Workmentioning
confidence: 99%
“…There are single keyword search VSSE schemes which are either new constructions supporting verifiability or design techniques to achieve verifiability on the existing SSE schemes by proposing generic algorithm. VSSE with single keyword search has been studied in [5], [7], [12]. In [20], [22] etc., VSSE scheme with conjunctive query has been studied.…”
Section: Introductionmentioning
confidence: 99%
“…It should be noted that in this case we have Eqs. (8) and (9). For further analysis, we define a new event, denoted by Evt 3 , as…”
Section: Theorem 2 Assume That a Is An Attacker In The Experiments Expmentioning
confidence: 99%
“…Generally, a cloud storage system should ensure availability (e.g., for any legitimate customer, (s)he can reach his/her uploaded data from some Internet-connected devices), reliability (of user data outsourced to the cloud), efficient retrieval (of user data outsourced to the cloud), data sharing (between authorized users), security (i.e., both confidentiality and integrity [5]), and other features required/stated in the service level agreements (SLAs). Cryptographic schemes, such as proxy re-encryption, attributebased encryption, searchable encryption [6][7][8][9], have been designed to achieve several of these features.…”
mentioning
confidence: 99%
“…At the same time, another of his methods [21] makes the routing and the storage and retrieval of resources in a Kademlia network more secure through exploiting reputation techniques for the Sybil attack in the network layer. With the development of public cloud storage [22] and new schemes for outsourced databases recently, the new encryption methods [23,24,25] and a practical oblivious RAM with a variable block size [26] may solve the privacy and security problems caused by the Sybil attack. This paper mainly discusses the attack detection of the physical layer in the WLAN [27], so the application of these algorithms will not be done.…”
Section: Related Workmentioning
confidence: 99%