Research Article

A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods

Table 1

Searchable encryption schemes with various functionalities.

Symm. Asymm. Ranked keyword Range Phrase Fuzzy keyword Similarity Subset

Ranked keyword query [4, 13, 14, 25] Yes Yes Possible Possible Possible
Range query [22, 23] Yes Yes Possible Possible Possible
Phrase query [20, 21] Yes Possible Yes Possible Possible
Fuzzy keyword query [3, 16, 17] Yes Possible Possible Yes Possible
Wildcard query [26] Yes Possible Yes Possible Possible
Similarity query [18, 19] Yes Possible Possible Possible Yes
Subset query [22] Yes Possible Possible Possible Yes
This paper Yes Yes Yes Yes Yes Yes Yes Yes