A survey of provably secure searchable encryption

C Bösch, P Hartel, W Jonker, A Peter - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …

Searchable encryption for healthcare clouds: A survey

R Zhang, R Xue, L Liu - IEEE Transactions on Services …, 2017 - ieeexplore.ieee.org
Outsourcing medical data and their search services to a third party cloud have been a
popular trend for many medical practices, because using healthcare cloud services can help …

Bonsai trees, or how to delegate a lattice basis

D Cash, D Hofheinz, E Kiltz, C Peikert - Journal of cryptology, 2012 - Springer
We introduce a new lattice-based cryptographic structure called a bonsai tree, and use it to
resolve some important open problems in the area. Applications of bonsai trees include an …

Dual-server public-key encryption with keyword search for secure cloud storage

R Chen, Y Mu, G Yang, F Guo… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Searchable encryption is of increasing interest for protecting the data privacy in secure
searchable cloud storage. In this paper, we investigate the security of a well-known …

An efficient public key encryption with conjunctive-subset keywords search

B Zhang, F Zhang - Journal of Network and Computer Applications, 2011 - Elsevier
Since Boneh et al. proposed the notion and construction of Public Key Encryption with
Keyword Search (PEKS) scheme, many revisions and extensions have been given …

Proxy re-encryption with keyword search

J Shao, Z Cao, X Liang, H Lin - Information Sciences, 2010 - Elsevier
We introduce a new cryptographic primitive, called proxy re-encryption with keyword search,
which is motivated by the following scenario in email systems: Charlie sends an encrypted …

Secure searchable encryption: a survey

Y Wang, J Wang, X Chen - Journal of communications and information …, 2016 - Springer
Cloud computing facilitates convenient and on-demand network access to a centralized pool
of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate …

Efficient selective identity-based encryption without random oracles

D Boneh, X Boyen - Journal of Cryptology, 2011 - Springer
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-
identity security reductions without random oracles in groups equipped with a bilinear map …

A survey of public-key encryption with search functionality for cloud-assisted IoT

H **ong, T Yao, H Wang, J Feng… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Nowadays, Internet of Things (IoT) is an attractive system to provide broad connectivity of a
wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines …

Public-key encryption with registered keyword search

Q Tang, L Chen - European public key infrastructure workshop, 2009 - Springer
Abstract Public-key Encryption with Keyword Search (PEKS) enables a server to test
whether a tag from a sender and a trapdoor from a receiver contain the same keyword. In …