Advances, Systems and Applications
Notation | Description |
---|---|
(PkO,SkO) | Data owner’ keys |
(PkR,SkR) | Receiver’ keys |
(PkS,SkS) | Server’keys |
κ | Security parameter |
Cw | Keyword ciphertext |
\(T_{w^{\prime }}\) | Search trapdoor |
\(\mathcal {C},\mathcal {A}\) | Challenger and adversary |
\(\mathcal {O}\) | Oracles |
g,h,g1 | Generators of group G1 |
G1,G2 | Multiplicative cyclic groups with order q |
q | A large prime number |
H1 | A hash function \(H_{1}:G_{1} \rightarrow Z_{q}^{*}\) |
H2 | A hash function \(H_{2}:\{0,1\}^{*} \rightarrow Z_{q}^{*}\) |
pp | A global parameter |
E | The time cost of one modular exponentiation |
Hp | The time cost of one Hash-to-point operation |
P | The time cost of one pairing operation |
M | The time cost of one multiplication operation |
H | The time cost of one hash function operation |
\(\vert \mathbb {G}_{1} \vert \) | the bit length of an element in \(\mathbb {G}_{1}\) |
\(\vert \mathbb {G}_{2} \vert \) | the bit length of an element in \(\mathbb {G}_{2}\) |
|q| | the bit length of an element in \(\mathbb {Z}_{q}\) |