Skip to main content

Advances, Systems and Applications

Table 2 Security index \(I_C\)

From: Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud

 

\(ID(C_1)\)

\(ID(C_2)\)

\(ID(C_3)\)

\(\cdots\)

\(ID(C_n)\)

Tag

\(p_{s_2}(w_n)\)

1

0

1

\(\cdots\)

0

\(tag_{w_n}\)

\(p_{s_2}(w_1)\)

1

1

0

\(\cdots\)

0

\(tag_{w_1}\)

\(\vdots\)

\(\vdots\)

\(\vdots\)

\(\vdots\)

\(\vdots\)

\(\vdots\)

\(\vdots\)

\(p_{s_2}(w_2)\)

0

0

1

\(\cdots\)

0

\(tag_{w_2}\)