Research on the searchable encryption
Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and well-known schemes of those two kinds of encrypt...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2016-10-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00101 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530294442655744 |
---|---|
author | Peng XU Hai JIN |
author_facet | Peng XU Hai JIN |
author_sort | Peng XU |
collection | DOAJ |
description | Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and well-known schemes of those two kinds of encryptions,their limitations,and the corresponding solutions were introduced.Specifically,two works under the condition of high security were introduced:one was to reduce the search complexity of searchable public-key encryption; the other one was to achieve the physical deletion of searchable symmetric-key ciphertexts. |
format | Article |
id | doaj-art-701245fdb8cd49cd86fe331f0731c83a |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2016-10-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-701245fdb8cd49cd86fe331f0731c83a2025-01-15T03:04:58ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-10-01281659548547Research on the searchable encryptionPeng XUHai JINSearchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and well-known schemes of those two kinds of encryptions,their limitations,and the corresponding solutions were introduced.Specifically,two works under the condition of high security were introduced:one was to reduce the search complexity of searchable public-key encryption; the other one was to achieve the physical deletion of searchable symmetric-key ciphertexts.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00101searchable encryptioncloud securitysearchable public-key encryption |
spellingShingle | Peng XU Hai JIN Research on the searchable encryption 网络与信息安全学报 searchable encryption cloud security searchable public-key encryption |
title | Research on the searchable encryption |
title_full | Research on the searchable encryption |
title_fullStr | Research on the searchable encryption |
title_full_unstemmed | Research on the searchable encryption |
title_short | Research on the searchable encryption |
title_sort | research on the searchable encryption |
topic | searchable encryption cloud security searchable public-key encryption |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00101 |
work_keys_str_mv | AT pengxu researchonthesearchableencryption AT haijin researchonthesearchableencryption |