Research Article
A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods
Algorithm 6
Search (asymmetric):
Search).
Input: | (1) : the user's public key. | (2) : encrypted documents. | (3) : global searchable structures . | (4) : local functional structures . | (5) : the search tokens . | Output: matched documents . | Method: | (1) compute ASE·Search. Let . | (2) for each and the functional structure () do | (3) let denote the searchable encryptions of , | where is the number of keywords in . | (4) for each () in do | (5) find where ASE·Test. | (6) compute . | (7) end for | (8) let , . | (9) end for | (10) for each functional component () do | (11) let , then the corresponding ) | and . Let . | (12) compute ← ·Filter. | (13) end for |
|