Public-key authenticated encryption with keyword search revisited: Security model and constructions

B Qin, Y Chen, Q Huang, X Liu, D Zheng - Information Sciences, 2020 - Elsevier
In cloud era, it is necessary to store sensitive data in an encrypted form. This arises the
interesting and challenging problem of searching on encrypted data. However, previous …

Searchable encryption: A survey

D Sharma - Information Security Journal: A Global Perspective, 2023 - Taylor & Francis
We explore the field of searchable encryption (SE) and present a comprehensive survey of
relevant literature. Since the existing survey articles are primarily written for the security …

Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee

B Wang, W Song, W Lou, YT Hou - 2015 IEEE Conference on …, 2015 - ieeexplore.ieee.org
With the growing awareness of data privacy, more and more cloud users choose to encrypt
their sensitive data before outsourcing them to the cloud. Search over encrypted data is …

Searchable encryption on the cloud: a survey

N Andola, R Gahlot, VK Yadav, S Venkatesan… - The Journal of …, 2022 - Springer
Outsourcing data to the cloud can be considered as a perfect solution for the storage and
computationally constrained data owners. However, data confidentiality is compromised …

Efficient verifiable public key encryption with keyword search based on KP-ABE

P Liu, J Wang, H Ma, H Nie - 2014 Ninth International …, 2014 - ieeexplore.ieee.org
As a very attractive cryptographic primitive, the public key encryption with keyword search
(PEKS) enables users to search on encrypted data, and hence is applicable to the setting of …

Provably secure public key encryption with keyword search for data outsourcing in cloud environments

S Ghosh, SKH Islam, A Bisht, AK Das - Journal of Systems Architecture, 2023 - Elsevier
In recent days, the application of cloud computing has been gaining significant popularity
among people. A considerable amount of data are being stored in the cloud server …

[PDF][PDF] A Study of Public Key Encryption with Keyword Search.

ST Hsu, CC Yang, MS Hwang - Int. J. Netw. Secur., 2013 - Citeseer
A Study of Public Key Encryption with Keyword Search Page 1 International Journal of Network
Security, Vol.15, No.2, PP.71–79, Mar. 2013 71 A Study of Public Key Encryption with Keyword …

Multi-user searchable encryption with coarser-grained access control in hybrid cloud

Z Liu, Z Wang, X Cheng, C Jia… - 2013 Fourth International …, 2013 - ieeexplore.ieee.org
In consideration of feasibility, searchable encryption schemes in multi-user setting have to
handle the problem of dynamical user injection and revocation, especially to make sure that …

Searchable encryption: a survey on privacy‐preserving search schemes on encrypted outsourced data

R Handa, CR Krishna… - … and Computation: Practice …, 2019 - Wiley Online Library
Outsourcing confidential data to cloud storage leads to privacy challenges that can be
reduced using encryption. However, with encryption in place, the utilization of the data is …

Multi-keyword search over encrypted data with scoring and search pattern obfuscation

C Orencik, A Selcuk, E Savas… - International Journal of …, 2016 - Springer
Search over encrypted data recently became a critical operation that raised a considerable
amount of interest in both academia and industry. Especially, as outsourcing, sensitive data …