2 code implementations • 30 Sep 2017 • Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao
Recently, several practical attacks raised serious concerns over the security of searchable encryption.
Cryptography and Security