Reference Hub7
Search in Encrypted Data: Theoretical Models and Practical Applications

Search in Encrypted Data: Theoretical Models and Practical Applications

Qiang Tang
ISBN13: 9781466640306|ISBN10: 1466640308|EISBN13: 9781466640313
DOI: 10.4018/978-1-4666-4030-6.ch004
Cite Chapter Cite Chapter

MLA

Tang, Qiang. "Search in Encrypted Data: Theoretical Models and Practical Applications." Theory and Practice of Cryptography Solutions for Secure Information Systems, edited by Atilla Elçi, et al., IGI Global, 2013, pp. 84-108. https://doi.org/10.4018/978-1-4666-4030-6.ch004

APA

Tang, Q. (2013). Search in Encrypted Data: Theoretical Models and Practical Applications. In A. Elçi, J. Pieprzyk, A. Chefranov, M. Orgun, H. Wang, & R. Shankaran (Eds.), Theory and Practice of Cryptography Solutions for Secure Information Systems (pp. 84-108). IGI Global. https://doi.org/10.4018/978-1-4666-4030-6.ch004

Chicago

Tang, Qiang. "Search in Encrypted Data: Theoretical Models and Practical Applications." In Theory and Practice of Cryptography Solutions for Secure Information Systems, edited by Atilla Elçi, et al., 84-108. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-4030-6.ch004

Export Reference

Mendeley
Favorite

Abstract

Recently, the concept of Search in Encrypted Data (SED) has become a highlight in cryptography. A SED scheme enables a client to have third-party server(s) perform certain search functionalities on the encrypted data. In this chapter, the authors conduct a systematic study on SED schemes. First, they describe three application scenarios and identify the desirable security requirements. Second, they provide two orthogonal categorizations and review the related security models for each category of SED schemes. Third, the authors analyze the practical issues related to SED schemes and identify some future research directions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.