Advances, Systems and Applications
From: Secure semantic search using deep learning in a blockchain-assisted multi-user setting
Blockchain-based schemes | Semantic-aware schemes | Our | |||||||
---|---|---|---|---|---|---|---|---|---|
[24] | [33] | [34] | [20] | [36] | [37] | [8] | [9] | ||
Semantic retrieval | \(\times\) | \(\checkmark\) | \(\times\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |
Probabilistic | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\checkmark\) |
Retrieval heuristic | \(\times\) | \(\checkmark\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\checkmark\) |
Weight model | – | YAKE | – | – | Word2Vec | SBERT | – | Word2Vec | Doc2Vec |
Multi-keyword | \(\times\) | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |
Result ordering | \(\times\) | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |
Integrity | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\times\) | \(\times\) | \(\checkmark\) | \(\times\) | \(\checkmark\) |
No TTP | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\checkmark\) |
Access control | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\checkmark\) |
Policy expressibility | – | – | – | – | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\checkmark\) |
Revocation | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\times\) | \(\checkmark\) |