Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system
暂无分享,去创建一个
Jiye Wang | Fagen Li | Zhihua Cheng | Erneste Uwizeye | Fagen Li | Zhihua Cheng | Jiye Wang | Erneste Uwizeye
[1] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[2] Qiang Tang,et al. Towards asymmetric searchable encryption with message recovery and flexible search authorization , 2013, ASIA CCS '13.
[3] Guang Gong,et al. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers , 2012, 2012 IEEE International Conference on Communications (ICC).
[4] Aytac Azgin,et al. CLKS: Certificateless Keyword Search on Encrypted Data , 2015, NSS.
[5] Xiaohui Liang,et al. PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.
[6] Yuan Li,et al. A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function , 2013, CSS.
[7] Chengyu Hu,et al. Public Key Encryption with Ranked Multi-keyword Search , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.
[8] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[9] Tong Li,et al. A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT , 2018, Secur. Commun. Networks.
[10] Jianhua Chen,et al. Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[11] Jing Li,et al. Improved collusion‐resisting secure nearest neighbor query over encrypted data in cloud , 2019, Concurr. Comput. Pract. Exp..
[12] Chunhua Jin,et al. Certificateless online/offline signcryption for the Internet of Things , 2015, Wireless Networks.
[13] Fatos Xhafa,et al. L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing , 2015, Knowl. Based Syst..
[14] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[15] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[16] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[17] Shouhuai Xu,et al. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[18] Peng Changgen,et al. Certificateless public key encryption with keyword search , 2014, China Communications.
[19] Xuemin Shen,et al. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage , 2015, IEEE Transactions on Emerging Topics in Computing.
[20] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[21] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[22] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[23] Xiaochun Cheng,et al. M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices , 2018, IEEE Access.
[24] Xiaohui Liang,et al. ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[25] Wenjun Luo,et al. Public key encryption with keyword search based on factoring , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.
[26] Anazida Zainal,et al. Secure Search Over Encrypted Data in Cloud Computing , 2013, 2013 International Conference on Advanced Computer Science Applications and Technologies.
[27] Hugo Krawczyk,et al. Outsourced symmetric private information retrieval , 2013, IACR Cryptol. ePrint Arch..
[28] Yuh-Min Tseng,et al. Efficient searchable ID-based encryption with a designated server , 2014, Ann. des Télécommunications.
[29] Jin Li,et al. Multi-authority fine-grained access control with accountability and its application in cloud , 2018, J. Netw. Comput. Appl..
[30] Yang Xiaoyuan,et al. A new public key encryption with temporary keyword search , 2010, 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering.
[31] Kaoru Kurosawa,et al. UC-Secure Searchable Symmetric Encryption , 2012, Financial Cryptography.
[32] Jiguo Li,et al. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage , 2017, IEEE Transactions on Services Computing.