Research Article

Multiuser Searchable Encryption with Token Freshness Verification

Figure 1

System model of Searchable Encryption (SE). Steps: Data Owner uploads a ciphertext (i.e., encrypted payload message + list of encrypted keywords) onto the Storage Server; Data User constructs a search token using a secret key; Data User sends to the server; Storage Server applies on ; Storage Server returns the result to the requesting user.