Paper 2012/648

Search in Encrypted Data: Theoretical Models and Practical Applications

Qiang Tang

Abstract

Recently, the concept of Search in Encrypted Data (SED) has become a highlight in cryptography. A SED scheme enables a client to have third-party server(s) to perform certain search functionalities on his encrypted data. In this book chapter, we aim at conducting a systematic study on SED schemes. Firstly, we describe three application scenarios and identify the desirable security requirements. Secondly, we provide two orthogonal categorizations and review the related security models for each category of SED schemes. Thirdly, we analyze the practical issues related to SED schemes and identify some future research directions.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
qiang tang @ uni lu
History
2012-11-21: received
Short URL
https://ia.cr/2012/648
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/648,
      author = {Qiang Tang},
      title = {Search in Encrypted Data: Theoretical Models and Practical Applications},
      howpublished = {Cryptology ePrint Archive, Paper 2012/648},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/648}},
      url = {https://eprint.iacr.org/2012/648}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.