Searching Keywords with Wildcards on Encrypted Data

  title={Searching Keywords with Wildcards on Encrypted Data},
  author={Saeed Sedghi and Peter van Liesdonk and Svetla Nikova and Pieter H. Hartel and Willem Jonker},
A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption key is also derived from such a vector, but this one is also allowed to have “?” (or wildcard) entries. Decryption is possible as long as these tuples agree on every position except where a “?” occurs. These schemes are useful for a variety of applications: they can be used as building block to construct attribute-based… CONTINUE READING
Highly Cited
This paper has 58 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 27 extracted citations

Information Security and Privacy

Lecture Notes in Computer Science • 2016
View 10 Excerpts
Highly Influenced

Cryptology and Network Security

Lecture Notes in Computer Science • 2015
View 7 Excerpts
Highly Influenced

Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions

IEEE Transactions on Information Forensics and Security • 2016
View 3 Excerpts
Highly Influenced

A Cloud Access Security Broker based approach for encrypted data search and sharing

2017 International Conference on Computing, Networking and Communications (ICNC) • 2017

59 Citations

Citations per Year
Semantic Scholar estimates that this publication has 59 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 23 references

Conjunctive, Subset, and Range Queries on Encrypted Data

IACR Cryptology ePrint Archive • 2006
View 7 Excerpts
Highly Influenced

Delegating Capabilities in Predicate Encryption Systems

IACR Cryptology ePrint Archive • 2008
View 4 Excerpts
Highly Influenced

Multi-Dimensional Range Query over Encrypted Data

2007 IEEE Symposium on Security and Privacy (SP '07) • 2007
View 2 Excerpts

Similar Papers

Loading similar papers…