A Survey of Provably Secure Searchable Encryption.
Christoph BöschPieter H. HartelWillem JonkerAndreas PeterPublished in: ACM Comput. Surv. (2014)
Keyphrases
- provably secure
- key management
- public key cryptography
- encryption scheme
- standard model
- digital signature
- public key
- signature scheme
- diffie hellman
- ciphertext
- blind signature
- security model
- secret key
- wireless sensor networks
- digital libraries
- resource constrained
- ad hoc networks
- bilinear pairings
- blind signature scheme
- hash functions
- secret sharing scheme
- key distribution
- private key
- threshold signature scheme
- elliptic curve
- secure communication
- security analysis
- security protocols
- data sharing
- cca secure
- information systems