By a News Reporter-Staff News Editor at Information Technology Newsweekly -- Researchers detail new data in Data Encryption. According to news reporting originating in Chengdu, People's Republic of China, by VerticalNews journalists, research stated, "Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with different searchable structures that are generally not compatible with each other, which limits the scope of application and hinders the functional extensions."
The news reporters obtained a quote from the research from the University of Electronic Science and Technology, "We prove that asymmetric searchable structure could be converted to symmetric structure, and functions could be modeled separately apart from the core searchable structure. Based on this observation, we propose a layered searchable encryption (LSE) scheme, which provides compatibility, flexibility, and security for various settings and functionalities. In this scheme, the outputs of the core searchable component based on either symmetric or asymmetric setting are converted to some uniform mappings, which are then transmitted to loosely coupled functional components to further filter the results. In such a way, all functional components could directly support both symmetric and asymmetric settings."
According to the news reporters, the research concluded: "Based on LSE, we propose two representative and novel constructions for ranked keyword query (previously only available in symmetric scheme) and range query (previously only available in asymmetric scheme)."
For more information on this research see: A layered searchable encryption scheme with functional components independent of encryption methods. Thescientificworldjournal [electronic Resource], 2014;2014():153791.
Our news correspondents report that additional information may be obtained by contacting G. Luo, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, People's Republic of China. Additional authors for this research include N. Peng, K. Qin and A. Chen.
Keywords for this news article include: Asia, Chengdu, Data Encryption, Information Technology, People's Republic of China, Information and Data Encoding and Encryption.
Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC