A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods
M.H. Noorallahzade,
R. Alimoradi,
A. Gholami and
Ram N. Mohapatra
International Journal of Mathematics and Mathematical Sciences, 2022, vol. 2022, 1-10
Abstract:
Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle to outsourcing sensitive data. To solve this problem, public key encryption with keyword search (PEKS) is suggested, which is a widely used method. Addressing this issue separately is beneficial because PEKS does not require a secure communication channel and key distribution. Therefore, at first glance, it seems that PEKS schemes should be used more in practical applications. Thus, reviewing and categorizing PEKS schemes are very important and necessary. In this article, we have tried to help reviewing the public key searchable encryption and categorizing these designs.
Date: 2022
References: Add references at CitEc
Citations: View citations in EconPapers (1)
Downloads: (external link)
http://downloads.hindawi.com/journals/ijmms/2022/3223509.pdf (application/pdf)
http://downloads.hindawi.com/journals/ijmms/2022/3223509.xml (application/xml)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:hin:jijmms:3223509
DOI: 10.1155/2022/3223509
Access Statistics for this article
More articles in International Journal of Mathematics and Mathematical Sciences from Hindawi
Bibliographic data for series maintained by Mohamed Abdelhakeem ().