Public key encryption schemes supporting equality test with authorisation of different granularity
暂无分享,去创建一个
[1] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[2] Dean F. Sittig. Personal health records on the internet: a snapshot of the pioneers at the end of the 20th Century , 2002, Int. J. Medical Informatics.
[3] Dong Hoon Lee,et al. Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data , 2006, Secure Data Management.
[4] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[5] Guomin Yang,et al. Probabilistic Public Key Encryption with Equality Test , 2010, CT-RSA.
[6] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[7] Matthew Green,et al. Correlation-Resistant Storage via Keyword-Searchable Encryption , 2005, IACR Cryptol. ePrint Arch..
[8] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[9] Qiang Tang,et al. Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization , 2011, ACISP.
[10] Qiang Tang,et al. Public-Key Encryption with Registered Keyword Search , 2009, EuroPKI.
[11] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[12] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[13] Pil Joong Lee,et al. Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System , 2007, Pairing.
[14] Manuel Blum,et al. Coin flipping by telephone a protocol for solving impossible problems , 1983, SIGA.
[15] Qiang Tang,et al. On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes , 2010 .
[16] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[17] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[18] Matthew K. Franklin,et al. Efficient Generation of Shared RSA Keys (Extended Abstract) , 1997, CRYPTO.
[19] Ronald L. Rivest,et al. Time-lock Puzzles and Timed-release Crypto , 1996 .
[20] Qiang Tang,et al. Public key encryption supporting plaintext equality test and user-specified authorization , 2012, Secur. Commun. Networks.
[21] Xavier Boyen,et al. The Uber-Assumption Family , 2008, Pairing.
[22] Victor Shoup,et al. Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..