Research Article
A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods
Algorithm 5
Encryption (asymmetric):
Enc).
Input: encryption key , the documents ). | Output: | (1) : encrypted documents ). | (2) : global searchable structures ). | (3) : local functional structures ). | Method: | (1) for each document () in do | (2) compute ← ASE·Enc). | (3) scan for all words to form a word list ). | (4) extract distinct keywords ) from . | (5) for each word () in do | (6) compute ← ASE·PEKS. | (7) compute . | (8) end for | (9) let map to map to . | (10) for each word () in do | (11) find the that the corresponding word . | (12) set . | (13) end for | (14) let . | (15) for each functional component () do | (16) compute ·Build. | (17) end for | (18) append to . | (19) end for | (20) output , , . |
|