Research Article
A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods
Table 1
Searchable encryption schemes with various functionalities.
| | Symm. | Asymm. | Ranked keyword | Range | Phrase | Fuzzy keyword | Similarity | Subset |
| Ranked keyword query [4, 13, 14, 25] | Yes | — | Yes | — | Possible | Possible | Possible | — | Range query [22, 23] | — | Yes | — | Yes | — | Possible | Possible | Possible | Phrase query [20, 21] | Yes | — | Possible | — | Yes | Possible | Possible | — | Fuzzy keyword query [3, 16, 17] | Yes | — | Possible | — | Possible | Yes | Possible | — | Wildcard query [26] | — | Yes | — | Possible | — | Yes | Possible | Possible | Similarity query [18, 19] | Yes | — | Possible | — | Possible | Possible | Yes | — | Subset query [22] | — | Yes | — | Possible | — | Possible | Possible | Yes | This paper | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
|