Search in Encrypted Data

Search in Encrypted Data

Author: 
Tang, Qiang
Place: 
Hershey, PA
Publisher: 
IGI Global
Date published: 
2013
Editor: 
Elçi, Atilla
Source: 
Theory and Practice of Cryptography Solutions for Secure Information Systems
Abstract: 

Recently, the concept of Search in Encrypted Data (SED) has become a highlight in cryptography. A SED scheme enables a client to have third-party server(s) perform certain search functionalities on the encrypted data. In this chapter, the authors conduct a systematic study on SED schemes. First, they describe three application scenarios and identify the desirable security requirements. Second, they provide two orthogonal categorizations and review the related security models for each category of SED schemes. Third, the authors analyze the practical issues related to SED schemes and identify some future research directions.

Series: 
Advances in Information Security, Privacy, and Ethics

CITATION: Tang, Qiang. Search in Encrypted Data edited by Elçi, Atilla . Hershey, PA : IGI Global , 2013. Theory and Practice of Cryptography Solutions for Secure Information Systems - Available at: https://library.au.int/search-encrypted-data