Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks.
Chengyu HuZhen LiPengtao LiuRupeng YangShanqing GuoHailong ZhangPublished in: Mob. Networks Appl. (2021)
Keyphrases
- public key encryption
- proxy re encryption
- keyword search
- keywords
- relational databases
- search engine
- structured data
- standard model
- security model
- xml documents
- xml keyword search
- xml data
- xml databases
- identity based encryption
- keyword queries
- data model
- cca secure
- query language
- keyword search over relational databases
- public key
- secret sharing
- ciphertext
- security analysis
- security mechanisms
- encryption scheme
- proximity search
- data sets
- watermarking scheme
- similarity search
- databases