Research Article
Revisiting the Practicality of Search on Encrypted Data: From the Security Broker’s Perspective
Table 3
Comparison between SE schemes and Enc-YUN. PEKS scheme: public-key encryption with keyword search scheme; SEKS scheme: symmetric-key encryption with keyword search scheme. and are the maximum # of keywords and files, is the # of unique keywords included in an updated file (added or deleted), is the # of incremental keywords in an updated file, is the # of parallel processors, and is the network latency introduced due to the interactions.
|