2012 IEEE International Conference on Communications (ICC) 2012
DOI: 10.1109/icc.2012.6364125
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers

Abstract: Outsourcing data to cloud servers, while increasing service availability and reducing users' burden of managing data, inevitably brings in new concerns such as data privacy, since the server may be honest-but-curious. To mediate the conflicts between data usability and data privacy in such a scenario, research of searchable encryption is of increasing interest.Motivated by the fact that a cloud server, besides its curiosity, may be selfish in order to save its computation and/or download bandwidth, in this pap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
114
0
1

Year Published

2012
2012
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 216 publications
(115 citation statements)
references
References 11 publications
0
114
0
1
Order By: Relevance
“…Since access pattern hiding requirement includes weak privacy requirements such as keyword privacy and trapdoor unlinkability in [18], we only address access pattern hiding. The efficiency requirement is somewhat stronger than those in the previous works [11], [18], [19] in the sense that the communication and computation of the server caused by searching is independent of the number of data stored. To our knowledge, no methods support both the third and fourth properties [1]- [6], [11], [18], [19].…”
Section: Problem Definitionmentioning
confidence: 54%
See 2 more Smart Citations
“…Since access pattern hiding requirement includes weak privacy requirements such as keyword privacy and trapdoor unlinkability in [18], we only address access pattern hiding. The efficiency requirement is somewhat stronger than those in the previous works [11], [18], [19] in the sense that the communication and computation of the server caused by searching is independent of the number of data stored. To our knowledge, no methods support both the third and fourth properties [1]- [6], [11], [18], [19].…”
Section: Problem Definitionmentioning
confidence: 54%
“…Some searchable encryption researches do not provide access pattern hiding [1]- [6], [11]. As far as we know, the scheme in [6] is the first approach dealing with searching encrypted data in a symmetric key setting.…”
Section: Searchable Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Publications that followed tended to focus on keyword search [6,7,9,18,22]. These early works quickly converged on an inverted index approach.…”
Section: Introductionmentioning
confidence: 99%
“…Usage of symmetric searchable encryption and the absence of a user verifiability feature in the schemes proposed by Chai et al (2012) and Kissel et al (2013) make the schemes unsuitable for a successful search. The verifiable conjunctive keyword search scheme proposed by Cheng et al (2015) also makes use of symmetric searchable encryption.…”
Section: Related Workmentioning
confidence: 99%