Research on the searchable encryption

Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and well-known schemes of those two kinds of encrypt...

Full description

Saved in:
Bibliographic Details
Main Authors: Peng XU, Hai JIN
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2016-10-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00101
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530294442655744
author Peng XU
Hai JIN
author_facet Peng XU
Hai JIN
author_sort Peng XU
collection DOAJ
description Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and well-known schemes of those two kinds of encryptions,their limitations,and the corresponding solutions were introduced.Specifically,two works under the condition of high security were introduced:one was to reduce the search complexity of searchable public-key encryption; the other one was to achieve the physical deletion of searchable symmetric-key ciphertexts.
format Article
id doaj-art-701245fdb8cd49cd86fe331f0731c83a
institution Kabale University
issn 2096-109X
language English
publishDate 2016-10-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-701245fdb8cd49cd86fe331f0731c83a2025-01-15T03:04:58ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-10-01281659548547Research on the searchable encryptionPeng XUHai JINSearchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and well-known schemes of those two kinds of encryptions,their limitations,and the corresponding solutions were introduced.Specifically,two works under the condition of high security were introduced:one was to reduce the search complexity of searchable public-key encryption; the other one was to achieve the physical deletion of searchable symmetric-key ciphertexts.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00101searchable encryptioncloud securitysearchable public-key encryption
spellingShingle Peng XU
Hai JIN
Research on the searchable encryption
网络与信息安全学报
searchable encryption
cloud security
searchable public-key encryption
title Research on the searchable encryption
title_full Research on the searchable encryption
title_fullStr Research on the searchable encryption
title_full_unstemmed Research on the searchable encryption
title_short Research on the searchable encryption
title_sort research on the searchable encryption
topic searchable encryption
cloud security
searchable public-key encryption
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00101
work_keys_str_mv AT pengxu researchonthesearchableencryption
AT haijin researchonthesearchableencryption