[Resource Topic] 2012/648: Search in Encrypted Data: Theoretical Models and Practical Applications

Welcome to the resource topic for 2012/648

Title:
Search in Encrypted Data: Theoretical Models and Practical Applications

Authors: Qiang Tang

Abstract:

Recently, the concept of Search in Encrypted Data (SED) has become a highlight in cryptography. A SED scheme enables a client to have third-party server(s) to perform certain search functionalities on his encrypted data. In this book chapter, we aim at conducting a systematic study on SED schemes. Firstly, we describe three application scenarios and identify the desirable security requirements. Secondly, we provide two orthogonal categorizations and review the related security models for each category of SED schemes. Thirdly, we analyze the practical issues related to SED schemes and identify some future research directions.

ePrint: https://eprint.iacr.org/2012/648

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .