Research Article
Secure Symmetric Keyword Search with Keyword Privacy for Cloud Storage Services
Table 3
Comparison among symmetric predicate encryptions.
| Scheme | Group order | Type of pairing | Hardness assumption | Class of encryption |
| Proposed scheme | | Symmetric | BDH and decision 3-party DH | Searchable | Shen et al. [20] | | Symmetric | C3DH and DLinear [20] | Predicated | Blundo et al. [12] | | Asymmetric | [12] | Predicated |
|
|
, , , and : prime values. |