SCIENCE CHINA Information Sciences, Volume 62 , Issue 3 : 039111(2019) https://doi.org/10.1007/s11432-017-9508-3

Secure key-aggregation authorized searchable encryption

More info
  • ReceivedDec 16, 2017
  • AcceptedMay 4, 2018
  • PublishedFeb 12, 2019


There is no abstract available for this article.


[1] Liang J, Han W L, Guo Z Q, et al. DESC: enabling secure data exchange based on smart contracts. Sci China Inf Sci, 2018, 61 049102. Google Scholar

[2] Bao F, Deng R H, Ding X H, et al. Private query on encrypted data in multi-user settings. In: Proceedings of International Conference on Information Security Practice and Experience. Berlin: Springer, 2008. 71--85. Google Scholar

[3] Shared and searchable encrypted data for untrusted servers. JCS, 2011, 19: 367-397 CrossRef Google Scholar

[4] Li M, Yu S C, Cao N, et al. Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS), 2011. 383--392. Google Scholar

[5] Shi J, Lai J Z, Li Y J, et al. Authorized keyword search on encrypted data. In: Proceedings of European Symposium on Research in Computer Security. Berlin: Springer, 2014. 419--435. Google Scholar

[6] Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Advances in Cryptology---Crypto. Berlin: Springer, 2005. 3621: 258--275. Google Scholar

[7] Cui B, Liu Z, Wang L. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage. IEEE Trans Comput, 2016, 65: 2374-2385 CrossRef Google Scholar

  • Table 1   Functionality comparison
    [2] [3] [4] Our scheme
    Key-aggregation authorization
    $\times$ $\times$ $\surd$ $\surd$
    Autonomic query
    $\times$ $\times$ $\surd$ $\surd$
    Collusion attack resistant
    $\surd$ $\surd$ $\times$ $\surd$
    Secret-key-extraction attack resistant
    $\surd$ $\surd$ $\times$ $\surd$