Searchable symmetric encryption: Difference between revisions

Content deleted Content added
No edit summary
WikiCleanerBot (talk | contribs)
m v2.04b - Bot T20 CW#61 - Fix errors for CW project (Reference before punctuation)
Line 36:
SSE security can be analyzed in several adversarial models but the most common are:
 
* the persistent model,<ref name=":1" />, where an adversary is given the encrypted data collection and a transcript of all the operations executed on the collection;
* the snapshot model,<ref name=":4">{{Cite journal|last=Amjad|first=Ghous|last2=Kamara|first2=Seny|last3=Moataz|first3=Tarik|date=2019-01-01|title=Breach-Resistant Structured Encryption|url=https://www.sciendo.com/article/10.2478/popets-2019-0014|journal=Proceedings on Privacy Enhancing Technologies|language=en|volume=2019|issue=1|pages=245–265|doi=10.2478/popets-2019-0014}}</ref>, where an adversary is only given the encrypted data collection (but possibly after each operation).
 
=== Security in the Persistent Model ===