Your English writing platform
Free sign upExact(1)
Differing from the previous schemes [1 3] based on symmetric encryption, the scheme by Boneh et al. [4] is the first to address the problem of the privacy-assured text retrieval with a public key system and allows multiusers to participate.
Similar(59)
The first searchable encryption scheme based on symmetric key primitive was proposed by Song et al. [17].
The encryption is efficient because most SSE schemes are based on symmetric primitives like block-ciphers and pseudo-random functions and requires very less computational overhead.
This scheme is based on symmetric design (Section 2).
Existing service-oriented architectures designed for the MCC are based on the symmetric encryption protocols to support the application layer.
Existing service-oriented architectures designed for mobile cloud computing are based on the symmetric encryption cryptography to support different media services.
The techniques we employ are based on symmetric-key cryptography.
Symmetric Searchable Encryption (SSE) as introduced by [2] relies on symmetric encryption primitives for efficiency reasons.
Eschenauer and Gligor [5] proposed a random key predistribution scheme that focuses on symmetric encryption and decryption.
The keying information, encrypted with based on any popular symmetric encryption algorithm (AES, DES, etc)., is transmitted to the requesting worker node securely.
Hence, the IMD security should either be based on lighter-weight symmetric encryption and authentication schemes [ 4, 7, 8] or employ a resource-rich personal device (e.g., smart phone) to mediate communication between an IMD and an external programmer [ 9– 11].
Write better and faster with AI suggestions while staying true to your unique style.
Since I tried Ludwig back in 2017, I have been constantly using it in both editing and translation. Ever since, I suggest it to my translators at ProSciEditing.
Justyna Jupowicz-Kozak
CEO of Professional Science Editing for Scientists @ prosciediting.com