A survey of provably secure searchable encryption

C Bösch, P Hartel, W Jonker, A Peter - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …

Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud

W Sun, S Yu, W Lou, YT Hou… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Search over encrypted data is a critically important enabling technique in cloud computing,
where encryption-before-outsourcing is a fundamental solution to protecting user data …

Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud

W Sun, S Yu, W Lou, YT Hou… - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
Search over encrypted data is a critically important enabling technique in cloud computing,
where encryption-before-outsourcing is a fundamental solution to protecting user data …

Search pattern leakage in searchable encryption: Attacks and new construction

C Liu, L Zhu, M Wang, Y Tan - Information Sciences, 2014 - Elsevier
Searching on remote encrypted data (commonly known as searchable encryption) has
become an important issue in secure data outsourcing, since it allows users to outsource …

Searchable encryption: A survey

D Sharma - Information Security Journal: A Global Perspective, 2023 - Taylor & Francis
We explore the field of searchable encryption (SE) and present a comprehensive survey of
relevant literature. Since the existing survey articles are primarily written for the security …

An efficient non-interactive multi-client searchable encryption with support for boolean queries

SF Sun, JK Liu, A Sakzad, R Steinfeld… - … Security–ESORICS 2016 …, 2016 - Springer
Motivated by the recent searchable symmetric encryption protocol of Cash et al., we propose
a new multi-client searchable encryption protocol in this work. By tactfully leveraging the …

Automatically detecting and describing high level actions within methods

G Sridhara, L Pollock, K Vijay-Shanker - Proceedings of the 33rd …, 2011 - dl.acm.org
One approach to easing program comprehension is to reduce the amount of code that a
developer has to read. Describing the high level abstract algorithmic actions associated with …

Multi-key searchable encryption

RA Popa, N Zeldovich - Cryptology ePrint Archive, 2013 - eprint.iacr.org
We construct a searchable encryption scheme that enables keyword search over data
encrypted with {\em different} keys. The scheme is practical and was designed to be …

AKSER: Attribute-based keyword search with efficient revocation in cloud computing

J Cui, H Zhou, H Zhong, Y Xu - Information Sciences, 2018 - Elsevier
With the advent of cloud computing, it is becoming increasingly popular for data owners to
outsource their data to public cloud servers while allowing indented data users to retrieve …

Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search

H Wang, X Dong, Z Cao - IEEE Transactions on Services …, 2017 - ieeexplore.ieee.org
ABKS has drawn much attention from research and industry in recent years, an ABKS
scheme is an encryption scheme that supports keyword search and access control. Attribute …