Paper 2012/648
Search in Encrypted Data: Theoretical Models and Practical Applications
Qiang Tang
Abstract
Recently, the concept of Search in Encrypted Data (SED) has become a highlight in cryptography. A SED scheme enables a client to have third-party server(s) to perform certain search functionalities on his encrypted data. In this book chapter, we aim at conducting a systematic study on SED schemes. Firstly, we describe three application scenarios and identify the desirable security requirements. Secondly, we provide two orthogonal categorizations and review the related security models for each category of SED schemes. Thirdly, we analyze the practical issues related to SED schemes and identify some future research directions.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Unknown where it was published
- Contact author(s)
- qiang tang @ uni lu
- History
- 2012-11-21: received
- Short URL
- https://ia.cr/2012/648
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2012/648, author = {Qiang Tang}, title = {Search in Encrypted Data: Theoretical Models and Practical Applications}, howpublished = {Cryptology {ePrint} Archive, Paper 2012/648}, year = {2012}, url = {https://eprint.iacr.org/2012/648} }