{"title":"可搜索加密:一项调查","authors":"Dhruti Sharma","doi":"10.1080/19393555.2022.2033367","DOIUrl":null,"url":null,"abstract":"ABSTRACT We explore the field of searchable encryption (SE) and present a comprehensive survey of relevant literature. Since the existing survey articles are primarily written for the security experts, we present the discussion to assist the general practitioners (not from security background) in identifying an appropriate SE scheme for their application of interest. We initiate with the brief overview of SE along with its application-oriented criteria. By analyzing various SE schemes, we derive five significant characteristics – key structure, search structure, search functionality, support to reader/writers, and reader’s capability. Based on these characteristics, we categorize the existing SE schemes and showcase the significant features offered by each scheme. We explore numerous schemes based on symmetric/asymmetric key structures, simple/inverted search structure, single/multi-keyword search functionality, single/multiple reader/writer support, and verification functionality owned by data reader. A most promising part of the survey is the comparative analysis of the existing schemes under specific category in terms of tables showing efficiency and security. We hope that this survey is indeed beneficial for the general practitioners to pick an appropriate SE scheme better suited to the selected application.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Searchable encryption : A survey\",\"authors\":\"Dhruti Sharma\",\"doi\":\"10.1080/19393555.2022.2033367\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT We explore the field of searchable encryption (SE) and present a comprehensive survey of relevant literature. Since the existing survey articles are primarily written for the security experts, we present the discussion to assist the general practitioners (not from security background) in identifying an appropriate SE scheme for their application of interest. We initiate with the brief overview of SE along with its application-oriented criteria. By analyzing various SE schemes, we derive five significant characteristics – key structure, search structure, search functionality, support to reader/writers, and reader’s capability. Based on these characteristics, we categorize the existing SE schemes and showcase the significant features offered by each scheme. We explore numerous schemes based on symmetric/asymmetric key structures, simple/inverted search structure, single/multi-keyword search functionality, single/multiple reader/writer support, and verification functionality owned by data reader. A most promising part of the survey is the comparative analysis of the existing schemes under specific category in terms of tables showing efficiency and security. We hope that this survey is indeed beneficial for the general practitioners to pick an appropriate SE scheme better suited to the selected application.\",\"PeriodicalId\":103842,\"journal\":{\"name\":\"Information Security Journal: A Global Perspective\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Security Journal: A Global Perspective\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/19393555.2022.2033367\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Journal: A Global Perspective","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/19393555.2022.2033367","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ABSTRACT We explore the field of searchable encryption (SE) and present a comprehensive survey of relevant literature. Since the existing survey articles are primarily written for the security experts, we present the discussion to assist the general practitioners (not from security background) in identifying an appropriate SE scheme for their application of interest. We initiate with the brief overview of SE along with its application-oriented criteria. By analyzing various SE schemes, we derive five significant characteristics – key structure, search structure, search functionality, support to reader/writers, and reader’s capability. Based on these characteristics, we categorize the existing SE schemes and showcase the significant features offered by each scheme. We explore numerous schemes based on symmetric/asymmetric key structures, simple/inverted search structure, single/multi-keyword search functionality, single/multiple reader/writer support, and verification functionality owned by data reader. A most promising part of the survey is the comparative analysis of the existing schemes under specific category in terms of tables showing efficiency and security. We hope that this survey is indeed beneficial for the general practitioners to pick an appropriate SE scheme better suited to the selected application.