International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 21 November 2012

Qiang Tang
ePrint Report ePrint Report
Recently, the concept of Search in Encrypted Data (SED) has become a highlight in cryptography. A SED scheme enables a client to have third-party server(s) to perform certain search functionalities on his encrypted data. In this book chapter, we aim at conducting a systematic study on SED schemes. Firstly, we describe three application scenarios and identify the desirable security requirements. Secondly, we provide two orthogonal categorizations and review the related security models for each category of SED schemes. Thirdly, we analyze the practical issues related to SED schemes and identify some future research directions.

Expand

Additional news items may be found on the IACR news page.