Research Article

Secure Symmetric Keyword Search with Keyword Privacy for Cloud Storage Services

Table 3

Comparison among symmetric predicate encryptions.

SchemeGroup orderType of pairingHardness assumptionClass of encryption

Proposed schemeSymmetricBDH and decision 3-party DHSearchable
Shen et al. [20]SymmetricC3DH and DLinear [20]Predicated
Blundo et al. [12]Asymmetric [12]Predicated

, , , and : prime values.