Cryptology ePrint Archive: Report 2012/648
Search in Encrypted Data: Theoretical Models and Practical Applications
Qiang Tang
Abstract: Recently, the concept of Search in Encrypted Data (SED) has become a highlight in cryptography. A SED scheme enables a client to have third-party server(s) to perform certain search functionalities on his encrypted data. In this book chapter, we aim at conducting a systematic study on SED schemes. Firstly, we describe three application scenarios and identify the desirable security requirements. Secondly, we provide two orthogonal categorizations and review the related security models for each category of SED schemes. Thirdly, we analyze the practical issues related to SED schemes and identify some future research directions.
Category / Keywords: cryptographic protocols /
Date: received 14 Nov 2012
Contact author: qiang tang at uni lu
Available format(s): PDF | BibTeX Citation
Version: 20121121:154504 (All versions of this report)
Short URL: ia.cr/2012/648
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]