Table 1: Comparison of security features.

Security feature Nguyen et al. [4] Symington et al. [5]Shikfa et al. 2009 [6]Shikfa et al. 2010 [1]Proposed scheme

End-to-end payload encryptionYesYesYesYesYes
Resilience to dictionary attackNoYesYesYesYes
User’s full privacyNoNoYesYesYes
Decryption based on content/contextNoNoNoYesYes
Secure partial match in forwardingNoNoNoYesYes
Secure fuzzy keyword index NoNoNoNoYes
Secure multiple keyword indexNoNoNoNoYes
Secure access control strategy for messageNoNoNoNoYes