Secure searchable encryption: a survey
Yunling WANG,Jianfeng WANG,Xiaofeng CHEN
Table2 Comparison of several PEKS schemes
scheme search time index size security assumption
Boneh, et al.[46] nvp nv(2e+p) PK-CKA2 BDH
Baek, et al.[53](PEKS-1) nvp nv(3e+p) PK-CKA2 CDH
Baek, et al.[53](PEKS-2) nvp nv(e+2p) PK-CKA2 BDH
Crescenzo and Saraswat[50] 4nlJ 4nvlJ PK-CKA2 QIP
Khader[52] 4nve 5+3nve PK-CKA2 DDH
Rhee, et al.[54] nv(e + p) 2nve+(7+nv)p PK-CKA2 BDH, 1-BDHI
Rhee, et al.[59] nv(2e + p) 2nve+nvp PK-CKA2 BDH, 1-BDHI