Character‐based symmetric searchable encryption and its implementation and experiment on mobile devices
Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption c...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2016-08, Vol.9 (12), p.1717-1725 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1725 |
---|---|
container_issue | 12 |
container_start_page | 1717 |
container_title | Security and communication networks |
container_volume | 9 |
creator | Suga, Takanori Nishide, Takashi Sakurai, Kouichi |
description | Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform a wildcard search, partial match search, and so on. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm our scheme can be used in these environments. Availability on portable devices will offer high convenience. Copyright © 2013 John Wiley & Sons, Ltd.
Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform wildcard searches. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm that our scheme can be used in these environments. |
doi_str_mv | 10.1002/sec.876 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1835556417</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1835556417</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4276-bcc64d942957c2f9888878a1a2db23eacd753d7b2bc09dc3edd444fc375a628f3</originalsourceid><addsrcrecordid>eNp1kMtKxDAUhoMoOI7iKxRcKMiMSZo27VLKeAHBhboO6ckpk6E3k47anY_gM_okZhiZheDZnMPPd24_IaeMzhml_MojzDOZ7pEJy-N8Rhnn-7uaiUNy5P2K0pQJKSbEFkvtNAzovj-_Su3RRH5sGhychcijdrDUZY0RtuDGfrBdG-nWRHbwkW36GhtsB72T8aNHZzdaFJSmK21oNfhmAf0xOah07fHkN0_Jy83iubibPTze3hfXDzMQXKazEiAVJhc8TyTwKs9CyEwzzU3JY9RgZBIbWfISaG4gRmOEEBXEMtEpz6p4Si62c3vXva7RD6qxHrCudYvd2iuWxUmSpILJgJ79QVfd2rXhukBRkcmEhWVTcr6lwHXeO6xUH37UblSMqo3lKliuguWBvNyS7-Hv8T9MPS2KDf0DDAiEYw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1804875175</pqid></control><display><type>article</type><title>Character‐based symmetric searchable encryption and its implementation and experiment on mobile devices</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Suga, Takanori ; Nishide, Takashi ; Sakurai, Kouichi</creator><creatorcontrib>Suga, Takanori ; Nishide, Takashi ; Sakurai, Kouichi</creatorcontrib><description>Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform a wildcard search, partial match search, and so on. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm our scheme can be used in these environments. Availability on portable devices will offer high convenience. Copyright © 2013 John Wiley & Sons, Ltd.
Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform wildcard searches. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm that our scheme can be used in these environments.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.876</identifier><language>eng</language><publisher>London: Hindawi Limited</publisher><subject>Availability ; Bloom filter ; Communication networks ; Encryption ; Feasibility ; partial‐matching search ; searchable encryption ; Searching ; Smartphones ; symmetric encryption ; Symmetry ; Tablet computers ; wildcard search</subject><ispartof>Security and communication networks, 2016-08, Vol.9 (12), p.1717-1725</ispartof><rights>Copyright © 2013 John Wiley & Sons, Ltd.</rights><rights>Copyright © 2016 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c4276-bcc64d942957c2f9888878a1a2db23eacd753d7b2bc09dc3edd444fc375a628f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Suga, Takanori</creatorcontrib><creatorcontrib>Nishide, Takashi</creatorcontrib><creatorcontrib>Sakurai, Kouichi</creatorcontrib><title>Character‐based symmetric searchable encryption and its implementation and experiment on mobile devices</title><title>Security and communication networks</title><description>Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform a wildcard search, partial match search, and so on. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm our scheme can be used in these environments. Availability on portable devices will offer high convenience. Copyright © 2013 John Wiley & Sons, Ltd.
Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform wildcard searches. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm that our scheme can be used in these environments.</description><subject>Availability</subject><subject>Bloom filter</subject><subject>Communication networks</subject><subject>Encryption</subject><subject>Feasibility</subject><subject>partial‐matching search</subject><subject>searchable encryption</subject><subject>Searching</subject><subject>Smartphones</subject><subject>symmetric encryption</subject><subject>Symmetry</subject><subject>Tablet computers</subject><subject>wildcard search</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kMtKxDAUhoMoOI7iKxRcKMiMSZo27VLKeAHBhboO6ckpk6E3k47anY_gM_okZhiZheDZnMPPd24_IaeMzhml_MojzDOZ7pEJy-N8Rhnn-7uaiUNy5P2K0pQJKSbEFkvtNAzovj-_Su3RRH5sGhychcijdrDUZY0RtuDGfrBdG-nWRHbwkW36GhtsB72T8aNHZzdaFJSmK21oNfhmAf0xOah07fHkN0_Jy83iubibPTze3hfXDzMQXKazEiAVJhc8TyTwKs9CyEwzzU3JY9RgZBIbWfISaG4gRmOEEBXEMtEpz6p4Si62c3vXva7RD6qxHrCudYvd2iuWxUmSpILJgJ79QVfd2rXhukBRkcmEhWVTcr6lwHXeO6xUH37UblSMqo3lKliuguWBvNyS7-Hv8T9MPS2KDf0DDAiEYw</recordid><startdate>201608</startdate><enddate>201608</enddate><creator>Suga, Takanori</creator><creator>Nishide, Takashi</creator><creator>Sakurai, Kouichi</creator><general>Hindawi Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>201608</creationdate><title>Character‐based symmetric searchable encryption and its implementation and experiment on mobile devices</title><author>Suga, Takanori ; Nishide, Takashi ; Sakurai, Kouichi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4276-bcc64d942957c2f9888878a1a2db23eacd753d7b2bc09dc3edd444fc375a628f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Availability</topic><topic>Bloom filter</topic><topic>Communication networks</topic><topic>Encryption</topic><topic>Feasibility</topic><topic>partial‐matching search</topic><topic>searchable encryption</topic><topic>Searching</topic><topic>Smartphones</topic><topic>symmetric encryption</topic><topic>Symmetry</topic><topic>Tablet computers</topic><topic>wildcard search</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Suga, Takanori</creatorcontrib><creatorcontrib>Nishide, Takashi</creatorcontrib><creatorcontrib>Sakurai, Kouichi</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Suga, Takanori</au><au>Nishide, Takashi</au><au>Sakurai, Kouichi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Character‐based symmetric searchable encryption and its implementation and experiment on mobile devices</atitle><jtitle>Security and communication networks</jtitle><date>2016-08</date><risdate>2016</risdate><volume>9</volume><issue>12</issue><spage>1717</spage><epage>1725</epage><pages>1717-1725</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform a wildcard search, partial match search, and so on. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm our scheme can be used in these environments. Availability on portable devices will offer high convenience. Copyright © 2013 John Wiley & Sons, Ltd.
Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform wildcard searches. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm that our scheme can be used in these environments.</abstract><cop>London</cop><pub>Hindawi Limited</pub><doi>10.1002/sec.876</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2016-08, Vol.9 (12), p.1717-1725 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_miscellaneous_1835556417 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection |
subjects | Availability Bloom filter Communication networks Encryption Feasibility partial‐matching search searchable encryption Searching Smartphones symmetric encryption Symmetry Tablet computers wildcard search |
title | Character‐based symmetric searchable encryption and its implementation and experiment on mobile devices |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T03%3A34%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Character%E2%80%90based%20symmetric%20searchable%20encryption%20and%20its%20implementation%20and%20experiment%20on%20mobile%20devices&rft.jtitle=Security%20and%20communication%20networks&rft.au=Suga,%20Takanori&rft.date=2016-08&rft.volume=9&rft.issue=12&rft.spage=1717&rft.epage=1725&rft.pages=1717-1725&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.876&rft_dat=%3Cproquest_cross%3E1835556417%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1804875175&rft_id=info:pmid/&rfr_iscdi=true |