Research on the searchable encryption
Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and well-known schemes of those two kinds of encrypt...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2016-10-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00101 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850090892707233792 |
|---|---|
| author | Peng XU Hai JIN |
| author_facet | Peng XU Hai JIN |
| author_sort | Peng XU |
| collection | DOAJ |
| description | Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and well-known schemes of those two kinds of encryptions,their limitations,and the corresponding solutions were introduced.Specifically,two works under the condition of high security were introduced:one was to reduce the search complexity of searchable public-key encryption; the other one was to achieve the physical deletion of searchable symmetric-key ciphertexts. |
| format | Article |
| id | doaj-art-701245fdb8cd49cd86fe331f0731c83a |
| institution | DOAJ |
| issn | 2096-109X |
| language | English |
| publishDate | 2016-10-01 |
| publisher | POSTS&TELECOM PRESS Co., LTD |
| record_format | Article |
| series | 网络与信息安全学报 |
| spelling | doaj-art-701245fdb8cd49cd86fe331f0731c83a2025-08-20T02:42:28ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-10-01281659548547Research on the searchable encryptionPeng XUHai JINSearchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and well-known schemes of those two kinds of encryptions,their limitations,and the corresponding solutions were introduced.Specifically,two works under the condition of high security were introduced:one was to reduce the search complexity of searchable public-key encryption; the other one was to achieve the physical deletion of searchable symmetric-key ciphertexts.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00101searchable encryptioncloud securitysearchable public-key encryption |
| spellingShingle | Peng XU Hai JIN Research on the searchable encryption 网络与信息安全学报 searchable encryption cloud security searchable public-key encryption |
| title | Research on the searchable encryption |
| title_full | Research on the searchable encryption |
| title_fullStr | Research on the searchable encryption |
| title_full_unstemmed | Research on the searchable encryption |
| title_short | Research on the searchable encryption |
| title_sort | research on the searchable encryption |
| topic | searchable encryption cloud security searchable public-key encryption |
| url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00101 |
| work_keys_str_mv | AT pengxu researchonthesearchableencryption AT haijin researchonthesearchableencryption |