Secure searchable encryption: a survey.
Yunling WangJianfeng WangXiaofeng ChenPublished in: J. Commun. Inf. Networks (2016)
Keyphrases
- encryption scheme
- key exchange
- key management
- security properties
- data encryption
- digital signature
- security analysis
- cryptographic protocols
- encryption decryption
- stream cipher
- integrity verification
- secret key
- private key
- image encryption
- authentication scheme
- digital libraries
- digital rights management
- data confidentiality
- public key cryptography
- diffie hellman
- security requirements
- mutual authentication
- public key
- secure communication
- data protection
- advanced encryption standard
- security protocols
- cryptographic algorithms
- encryption key
- standard model
- encryption algorithms
- key distribution
- high security
- access control
- authentication protocol
- wireless sensor networks
- group communication
- ciphertext
- security issues
- sensitive data
- key establishment
- block cipher
- smart card
- identity authentication
- data quality
- ad hoc networks
- data sharing
- security level
- secret sharing scheme
- elliptic curve
- security mechanisms
- resource constrained