Substring-Searchable Symmetric Encryption
Citations
107 citations
Cites background from "Substring-Searchable Symmetric Encr..."
...Curtmola et al. [2006] introduced this approach, and subsequent schemes are proposed by Wang et al....
[...]
...Curtmola et al. [2006] introduced this approach, and subsequent schemes are proposed by Wang et al. [2010], Chase and Kamara [2010], Kamara et al....
[...]
71 citations
69 citations
Cites methods from "Substring-Searchable Symmetric Encr..."
...Chase and Shen [109] design a protection method based on suffix trees to enable substring search....
[...]
...Chase and Shen [109] design a protection method...
[...]
...Chase-Shen [109], [126] Custom 2 — # G # # 4 ◔ G# substring search Moataz-Blass [123] Obliv 2 — G# # # 4 # # # ◔ substring search...
[...]
38 citations
Cites background from "Substring-Searchable Symmetric Encr..."
...Very recently, Chase and Shen [9] proposed a symmetric searchable encryption scheme supporting subsequence matching....
[...]
...Another scheme [9] has limited privacy guarantee due to the leakage of the search pattern....
[...]
35 citations
References
8,285 citations
5,770 citations
"Substring-Searchable Symmetric Encr..." refers methods in this paper
...We combine basic symmetric-key primitives to develop a method that allows traversal of select edges in a suffix tree in order to efficiently perform substring search on encrypted data, without revealing significant information about the string or the queries....
[...]
3,904 citations
3,270 citations
"Substring-Searchable Symmetric Encr..." refers methods in this paper
...We will use a symmetric encryption scheme Π, a PRF F , and a PRP P ....
[...]