A ciphertext-policy attribute-based encryption scheme supporting keyword search function

C Wang, W Li, Y Li, X Xu - … and Security: 5th International Symposium, CSS …, 2013 - Springer
… scheme with keyword search function (KSF-CP-… of keywords. Only authorized users whose
credentials satisfy the access policy can retrieve this encrypted data through keyword search

KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage

J Li, X Lin, Y Zhang, J Han - IEEE Transactions on Services …, 2016 - ieeexplore.ieee.org
… Based on the structure of the above, we add a function called keyword search function [28]. …
f0;1glog p are two secure hash functions. TA publishes PK ¼ ðG1;G2; g; g1;g2; h; h1;...;hn;…

Pairing-free certificate-based searchable encryption supporting privacy-preserving keyword search function for IIoTs

Y Lu, J Li, F Wang - IEEE Transactions on Industrial Informatics, 2020 - ieeexplore.ieee.org
… offers a privacy-preserving keyword search function that makes the scheme withstand the
KGA. The KGA may be the sternest menace to the keyword search encryption because it may …

Keyword search and oblivious pseudorandom functions

MJ Freedman, Y Ishai, B Pinkas, O Reingold - Theory of Cryptography …, 2005 - Springer
… This section defines the private keyword search problem and some of its variants. We assume
the reader’s familiarity with standard simulation-based definitions of secure computation (cf…

Efficient IR-style keyword search over relational databases

V Hristidis, Y Papakonstantinou, L Gravano - Proceedings 2003 VLDB …, 2003 - Elsevier
… To rank tuple trees, this chapter introduces a ranking function that leverages … keyword
search on individual text attributes and rank tuples accordingly. In particular, the ranking function

[图书][B] Keyword search in databases

JX Yu, L Chang, L Qin - 2022 - books.google.com
… user-given keywords. The former … keyword search and keyword query interchangeably.
We introduce forms of answers, scoring/ranking functions, and approaches to process keyword

Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds

Y Yang, M Ma - IEEE Transactions on Information Forensics …, 2015 - ieeexplore.ieee.org
… secure conjunctive keyword search and authorized delegation function. Compared with …
against chosen-keyword chosen-time attack. Furthermore, off-line keyword guessing attacks …

Keyword search on structured and semi-structured data

Y Chen, W Wang, Z Liu, X Lin - Proceedings of the 2009 ACM SIGMOD …, 2009 - dl.acm.org
… , performance optimization, and search quality evaluation. Vari… built upon keyword search,
such as keyword based database … functions [17, 34] and nonmonotonic ranking functions [39]. …

Keyword search on spatial databases

I De Felipe, V Hristidis, N Rishe - 2008 IEEE 24th International …, 2008 - ieeexplore.ieee.org
… The result of Qw is a list of objects ordered by the relevance IRscore(Tt, Qw) of their textual
descriptions to the query keywords, as measured by an IR ranking function [SinO 1]. A special …

Beyond keyword search: discovering relevant scientific literature

K El-Arini, C Guestrin - Proceedings of the 17th ACM SIGKDD …, 2011 - dl.acm.org
… natural way of searching for relevant scientific literature. Rather than a string of keywords,
we … By optimizing an objective function based on a fine-grained notion of influence between …