Skip to main content

Table 1 Comparison of schemes with respect to different models

From: Security models for delegated keyword searching within encrypted contents

Schemes

Security models

[11]

KG-wCKA

KG-sCKA

RPSL [10]

No

No

No

RSK-like [11, 12]

Yes

Yes

No

KG-sCKA dPEKS of Sect. 6

Yes

Yes

Yes