Research Article

Multiuser Searchable Encryption with Token Freshness Verification

Figure 2

System model of Functional Encryption (FE). Steps: Data Owner uploads ciphertext onto the Storage Server; Data User requests TA for a token of a function (F); TA issues a token to the user; Data User sends to the Storage Server; Storage Server runs on available ; Storage Server forwards the result to the user.