From: Security models for delegated keyword searching within encrypted contents
Schemes
Security models
[11]
KG-wCKA
KG-sCKA
RPSL [10]
No
RSK-like [11, 12]
Yes
KG-sCKA dPEKS of Sect. 6