Search in Encrypted Data: Theoretical Models and Practical Applications

Recently, the concept of Search in Encrypted Data (SED) has become a highlight in cryptography. A SED scheme enables a client to have third-party server(s) to perform certain search functionalities on his encrypted data. In this paper, the authors aim at conducting a systematic study on SED schemes. They describe three application scenarios and identify the desirable security requirements. And they provide two orthogonal categorizations and review the related security models for each category of SED schemes. Also they analyze the practical issues related to SED schemes and identify some future research directions.

Provided by: University of Luton Topic: Security Date Added: Nov 2012 Format: PDF

Find By Topic