2016
DOI: 10.1007/978-3-319-40367-0_10
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
76
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(76 citation statements)
references
References 20 publications
0
76
0
Order By: Relevance
“…Thus, the computational cost of the main construction can be considered to be practical. Moreover, for the storage cost, in spite of two additional components in Z p , the storage size is fairly identical to that of the scheme by Zhou et al In particular, an element in G is constructed by two integers on an elliptic curve, i.e., x- Cui et al [9] Li et al [11] Zhou et al [20] First Construction Main Construction encrypted keyword 2|G| coordinate and y-coordinate, whose bit lengths are the same as the bit length of an element in Z p . Thus, the entire bit length of 2Z p is equal to that of G. The main construction can achieve a similar storage size as other works.…”
Section: ) Performance Evaluationmentioning
confidence: 89%
See 4 more Smart Citations
“…Thus, the computational cost of the main construction can be considered to be practical. Moreover, for the storage cost, in spite of two additional components in Z p , the storage size is fairly identical to that of the scheme by Zhou et al In particular, an element in G is constructed by two integers on an elliptic curve, i.e., x- Cui et al [9] Li et al [11] Zhou et al [20] First Construction Main Construction encrypted keyword 2|G| coordinate and y-coordinate, whose bit lengths are the same as the bit length of an element in Z p . Thus, the entire bit length of 2Z p is equal to that of G. The main construction can achieve a similar storage size as other works.…”
Section: ) Performance Evaluationmentioning
confidence: 89%
“…Cui et al [9] Li et al [11] Zhou et al [20] The scheme by Cui et al [9] does not satisfy the keyword privacy because random values embedded in encrypted keywords are common for every keywords. We show an example where the scheme by Cui et al is broken under our definition of the keyword privacy below.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations