Multi-User Revocable Keyword Search Scheme for
نویسندگان
چکیده
منابع مشابه
Efficient Multi-User Indexing for Secure Keyword Search
Secure keyword search in shared infrastructures prevents stored documents from leaking confidential information to unauthorized users. We assume that a shared index provides confidentiality if it can only be used by users authorized to search all the documents contained in the index. We introduce the Lethe indexing workflow to improve query and update efficiency in secure keyword search. Lethe ...
متن کاملEfficient Encrypted Keyword Search for Multi-user Data Sharing
In this paper, we provide a secure and e cient encrypted keyword search scheme for multi-user data sharing. Specifically, a data owner outsources a set of encrypted files to an untrusted server, shares it with a set of users, and a user is allowed to search keywords in a subset of files that he is authorized to access. In the proposed scheme, (a) each user has a constant size secret key, (b) ea...
متن کاملCiphertext-policy Hidden Vector Encryption for Multi-User Keyword Search
In cloud computing, large amount of data can be effectively stored and managed. To ensure data security and efficient retrieval, people can encrypt data using searchable encryption (SE) before outsourcing. However, most existing SE schemes only support single-user access, and multi-user SE is required in many enterprise applications. We found that the flexibility and usability of encryption sch...
متن کاملExplorer Efficient Encrypted Keyword Search for Multi - user Data Sharing
In this paper, we provide a secure and e cient encrypted keyword search scheme for multi-user data sharing. Specifically, a data owner outsources a set of encrypted files to an untrusted server, shares it with a set of users, and a user is allowed to search keywords in a subset of files that he is authorized to access. In the proposed scheme, (a) each user has a constant size secret key, (b) ea...
متن کاملAn Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
With the increasing popularity of cloud computing, more and more sensitive or private information has been outsourced onto the cloud server. For protecting data privacy, sensitive data usually has to be encrypted before outsourcing, which makes traditional search techniques based on plaintext useless. In response to the search over encrypted data, searchable encryption is a good solution in Inf...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2018
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/1087/3/032015