Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (10): 8-16.doi: 10.11959/j.issn.2096-109x.2016.00101

• Comprehensive Reviews • Previous Articles     Next Articles

Research on the searchable encryption

Peng XU1,2,3(),Hai JIN1,2,3   

  1. 1 Services Computing Technology and System Lab,School of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan 430074,China
    2 Cluster and Grid Computing Lab,School of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan 430074,China
    3 Big Data Technology and System Lab,School of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan 430074,China
  • Revised:2016-09-27 Online:2016-10-01 Published:2020-03-17
  • Supported by:
    The National Basic Research Program of China (973 Program)(2014CB340600);he National Natural Science Foundation of China(61472156)

Abstract:

Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and well-known schemes of those two kinds of encryptions,their limitations,and the corresponding solutions were introduced.Specifically,two works under the condition of high security were introduced:one was to reduce the search complexity of searchable public-key encryption; the other one was to achieve the physical deletion of searchable symmetric-key ciphertexts.

Key words: searchable encryption, cloud security, searchable public-key encryption

CLC Number: 

No Suggested Reading articles found!