A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods

M.H. Noorallahzade, R. Alimoradi, A. Gholami, Ram N. Mohapatra
2022 International Journal of Mathematics and Mathematical Sciences  
Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle to outsourcing sensitive data. To solve this problem, public key encryption with keyword search (PEKS) is suggested, which is a widely used method. Addressing this issue separately is beneficial because PEKS does not require a secure communication channel and key distribution. Therefore, at
more » ... t glance, it seems that PEKS schemes should be used more in practical applications. Thus, reviewing and categorizing PEKS schemes are very important and necessary. In this article, we have tried to help reviewing the public key searchable encryption and categorizing these designs.
doi:10.1155/2022/3223509 fatcat:5ophwgumlvfxloq2iytpfujfza