Survey on the searchable encryption

被引:0
|
作者
Jia, Chun-Fu [1 ,3 ]
Liu, Zhe-Li [1 ]
Li, Jin [2 ]
Li, Min [1 ]
机构
[1] Department of Computer & Information Security, College of Computer and Control Engineering, Nankai University, Tianjin,300071, China
[2] School of Computer Science and Educational Software, Guangzhou University, Guangzhou,510006, China
[3] Information Security Evaluation Cener of Civil Aviation, Civil Aviation University of China, Tianjin,300300, China
来源
Ruan Jian Xue Bao/Journal of Software | 2015年 / 26卷 / 01期
关键词
D O I
10.13328/j.cnki.jos.004700
中图分类号
学科分类号
摘要
This paper reviews previous research on the two basic searchable encryption problems, and introduces the classification of searchable encryption (SE), including its application scenarios and usage models. After discussing the resolution strategies, it divides SE into two groups, that is symmetric searchable encryption and asymmetric searchable encryption. Based on this classification, the research advance is surveyed on basic definition, typical construction and extended research. Finally, the need-to-be-solved problems and main research directions are discussed. This study aims at promoting further research of searchable encryption. ©2015 ISCAS.
引用
收藏
页码:109 / 128
相关论文
共 50 条
  • [41] Searchable Symmetric Encryption: Designs and Challe
    Sen Poh, Geong
    Chin, Ji-Jian
    Yau, Wei-Chuen
    Choo, Kim-Kwang Raymond
    Mohamad, Moesfa Soeheila
    ACM COMPUTING SURVEYS, 2017, 50 (03)
  • [42] Decryptable searchable encryption with a designated tester
    Hu, Chengyu
    Liu, Pengtao
    CEIS 2011, 2011, 15
  • [43] Searchable Symmetric Encryption for Restricted Search
    Horvath, Mate
    Vajda, Istvan
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2018, 14 (01) : 104 - 111
  • [44] Research on Privacy Preserving of Searchable Encryption
    Feng, Tao
    He, Weiyou
    PROCEEDINGS OF THE 2018 2ND HIGH PERFORMANCE COMPUTING AND CLUSTER TECHNOLOGIES CONFERENCE (HPCCT 2018), 2018, : 58 - 68
  • [45] Flexible Wildcard Searchable Encryption System
    Yang, Yang
    Liu, Ximeng
    Deng, Robert H.
    Weng, Jian
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (03) : 464 - 477
  • [46] Passive Attacks Against Searchable Encryption
    Ning, Jianting
    Xu, Jia
    Liang, Kaitai
    Zhang, Fan
    Chang, Ee-Chien
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (03) : 789 - 802
  • [47] Dynamic Searchable Encryption with Access Control
    Bloemer, Johannes
    Loeken, Nils
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2019, 2020, 12056 : 308 - 324
  • [48] Research Advances on Secure Searchable Encryption
    Dong X.
    Zhou J.
    Cao Z.
    Cao, Zhenfu (zfcao@sei.ecnu.edu.cn), 1600, Science Press (54): : 2107 - 2120
  • [49] Searchable Symmetric Encryption Security Definitions
    Mohamad, M. S.
    Tan, S. Y.
    Chin, J. J.
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2019, 13 : 31 - 47
  • [50] Tight Tradeoffs in Searchable Symmetric Encryption
    Asharov, Gilad
    Segev, Gil
    Shahaf, Ido
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 407 - 436