Secure searchable encryption: a survey
Yunling WANG
1
(
),Jianfeng WANG
1,
2
(
),Xiaofeng CHEN
1
(
)
.
Figure2.
Encryption procedure