If a user (other than the data owner) possesses the secret key in symmetric searchable encryption scheme are they able to run the trapdoor algorithm, or is this not publicly available?
Asked
Active
Viewed 71 times
1
-
2In an academic cryptographic context, any algorithm is assumed public (except in specific domains like code obfuscation); that's the second of Kerckhoffs's principles. – fgrieu Jul 04 '14 at 14:38