Cryptology ePrint Archive: Report 2012/648

Search in Encrypted Data: Theoretical Models and Practical Applications

Qiang Tang

Abstract: Recently, the concept of Search in Encrypted Data (SED) has become a highlight in cryptography. A SED scheme enables a client to have third-party server(s) to perform certain search functionalities on his encrypted data. In this book chapter, we aim at conducting a systematic study on SED schemes. Firstly, we describe three application scenarios and identify the desirable security requirements. Secondly, we provide two orthogonal categorizations and review the related security models for each category of SED schemes. Thirdly, we analyze the practical issues related to SED schemes and identify some future research directions.

Category / Keywords: cryptographic protocols /

Date: received 14 Nov 2012

Contact author: qiang tang at uni lu

Available format(s): PDF | BibTeX Citation

Version: 20121121:154504 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]