Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data

D Shiraly, Z Eslami, N Pakniat - Journal of Cloud Computing, 2024 - Springer
With the rapid development of cloud computing technology, cloud storage services are
becoming more and more mature. However, the storage of sensitive data on remote servers …