Searchable encryption allows an encrypter to send a message, in an encrypted form, to a decryptor who can delegate to a third party to search the encrypted message for keywords without losing encrypted message content's privacy. In this paper, based on the bilinear pairings, we propose a new efficient searchable encryption scheme, and use the provable security technique to formally prove its security in the random oracle model. Since some time-consuming operations can be pre-computed, the proposed scheme is very efficient. Therefore, it is particularly suitable for time-critical applications, such as network forensics scenarios, especial when the content is encrypted due to privacy concerns. © 2011 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.
CITATION STYLE
Lin, X., Lu, R., Foxton, K., & Shen, X. (2011). An efficient searchable encryption scheme and its application in network forensics. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (Vol. 56, pp. 66–78). https://doi.org/10.1007/978-3-642-23602-0_6
Mendeley helps you to discover research relevant for your work.