Secure searchable encryption: a survey
Yunling WANG1(),Jianfeng WANG1,2(),Xiaofeng CHEN1()

.

Figure2. Encryption procedure