Research Article
A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security
Table 2
Comparison with prior forward private SSE schemes.
| Schemes | Security | Dynamism | Multiuser | Computable Complexity | Storage | Communication complexity | F/B/CKA | D/S | S/M | Cloud | R | Update | Do | Update do to C |
| Stefanov et al. [18] | F | D | S | | 1 | | | | [19] | F | D | S | | 1 | | | | Wang et al. [20] | F | D | M | | 2 | | | | Khons et al. [23] | | D | S | | 2 | | | | Zuo et al. [26] | | D | S | | 1 | | | | SSE-1 [31] | NA | S | S | | 1 | - | | - | SSE-2 [31] | A | S | S | | 1 | - | | - | M-SSE [31] | NA | S | M | | 1 | - | | - | Bost [35] | | D | S | | 3 | | | | FBM-DSSE | | D | M | | 1 | | | |
|
|