Expressive search on encrypted data

@inproceedings{Lai2013ExpressiveSO,
  title={Expressive search on encrypted data},
  author={Junzuo Lai and Xuhua Zhou and Robert H. Deng and Yingjiu Li and Kefei Chen},
  booktitle={ASIA CCS '13},
  year={2013}
}
Different from the traditional public key encryption, searchable public key encryption allows a data owner to encrypt his data under a user's public key in such a way that the user can generate search token keys using her secret key and then query an encryption storage server. On receiving such a search token key, the server filters all or related stored encryptions and returns matched ones as response. Searchable pubic key encryption has many promising applications. Unfortunately, existing… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 29 CITATIONS

An Enhanced and Reliable Over Encrypted Data in Cloud

VIEW 6 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

  • IEEE Transactions on Dependable and Secure Computing
  • 2016
VIEW 12 EXCERPTS
CITES BACKGROUND & METHODS

A Novel Model for Lattice-Based Authorized Searchable Encryption with Special Keyword

VIEW 5 EXCERPTS
CITES RESULTS, BACKGROUND & METHODS
HIGHLY INFLUENCED

Expressive and Secure Searchable Encryption in the Public Key Setting

VIEW 10 EXCERPTS
CITES METHODS, BACKGROUND & RESULTS
HIGHLY INFLUENCED

References

Publications referenced by this paper.
SHOWING 1-10 OF 13 REFERENCES

An efficient public key encryption with conjunctive-subset keywords search

  • J. Network and Computer Applications
  • 2011
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Conjunctive

D. Boneh, B. Waters
  • subset, and range queries on encrypted data. In TCC, pages 535–554
  • 2007
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

Decryptable Searchable Encryption

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL