A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods

Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle to outsourcing sensitive data. To solve this problem, public key encryption with keyword search...

Full description

Saved in:
Bibliographic Details
Main Authors: M.H. Noorallahzade, R. Alimoradi, A. Gholami
Format: Article
Language:English
Published: Wiley 2022-01-01
Series:International Journal of Mathematics and Mathematical Sciences
Online Access:http://dx.doi.org/10.1155/2022/3223509
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle to outsourcing sensitive data. To solve this problem, public key encryption with keyword search (PEKS) is suggested, which is a widely used method. Addressing this issue separately is beneficial because PEKS does not require a secure communication channel and key distribution. Therefore, at first glance, it seems that PEKS schemes should be used more in practical applications. Thus, reviewing and categorizing PEKS schemes are very important and necessary. In this article, we have tried to help reviewing the public key searchable encryption and categorizing these designs.
ISSN:1687-0425