Survey on the searchable encryption

被引:0
|
作者
Jia, Chun-Fu [1 ,3 ]
Liu, Zhe-Li [1 ]
Li, Jin [2 ]
Li, Min [1 ]
机构
[1] Department of Computer & Information Security, College of Computer and Control Engineering, Nankai University, Tianjin,300071, China
[2] School of Computer Science and Educational Software, Guangzhou University, Guangzhou,510006, China
[3] Information Security Evaluation Cener of Civil Aviation, Civil Aviation University of China, Tianjin,300300, China
来源
Ruan Jian Xue Bao/Journal of Software | 2015年 / 26卷 / 01期
关键词
D O I
10.13328/j.cnki.jos.004700
中图分类号
学科分类号
摘要
This paper reviews previous research on the two basic searchable encryption problems, and introduces the classification of searchable encryption (SE), including its application scenarios and usage models. After discussing the resolution strategies, it divides SE into two groups, that is symmetric searchable encryption and asymmetric searchable encryption. Based on this classification, the research advance is surveyed on basic definition, typical construction and extended research. Finally, the need-to-be-solved problems and main research directions are discussed. This study aims at promoting further research of searchable encryption. ©2015 ISCAS.
引用
收藏
页码:109 / 128
相关论文
共 50 条
  • [31] Research on Asymmetric Searchable Encryption
    Yu, Zonghua
    Wu, Yudong
    MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I, 2017, 1839
  • [32] Searchable Encryption through Dispersion
    Aiello Montandon, Carlos
    Vidal Introini, Luis
    Schwarz S. J., Thomas L. E.
    2014 IEEE CENTRAL AMERICA AND PANAMA CONVENTION (CONCAPAN XXXIV), 2014,
  • [33] Broadcast Searchable Keyword Encryption
    Ali, Mohamed Ali Hamza
    Zhong, Ting
    Li, Fagen
    Qin, Zhiguan
    Abdelrahaman, Ahmed A. A.
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1010 - 1016
  • [34] Searchable Encryption in the Modern Era
    Curran, Kevin
    2017 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2017,
  • [35] The Locality of Searchable Symmetric Encryption
    Cash, David
    Tessaro, Stefano
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 351 - 368
  • [36] Verifiable dynamic searchable encryption
    Etemad, Mohammad
    Kupcu, Alptekin
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 27 (04) : 2606 - 2623
  • [37] Garbled Searchable Symmetric Encryption
    Kurosawa, Kaoru
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 234 - 251
  • [38] Unconditionally Secure Searchable Encryption
    Yoshizawa, Takahiro
    Watanabe, Yohei
    Shikata, Junji
    2017 51ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2017,
  • [39] Asymmetric Searchable Encryption from Inner Product Encryption
    Xiao, Siyu
    Ge, Aijun
    Zhang, Jie
    Ma, Chuangui
    Wang, Xu'an
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 123 - 132
  • [40] Searchable encryption: A survey on privacy-preserving search schemes on encrypted outsourced data
    Handa, Rohit
    Krishna, C. Rama
    Aggarwal, Naveen
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (17):