In this paper, we offer solutions for this problem under well-defined security requirements. Our schemes are efficient in the sense that no public-key cryptosystem is involved. Indeed, our approach is independent of the encryption method chosen for the remote files. They are also incremental, in that \U\ can submit new files which are totally secure against previous queries but still searchable against future queries.
Category / Keywords: cryptographic protocols / Date: received 21 Feb 2004, last revised 3 Mar 2004 Contact author: ycchang at eecs harvard edu Available formats: Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation Version: 20040303:192146 (All versions of this report) Discussion forum: Show discussion | Start new discussion