Efficient Group ID-Based Encryption With Equality Test Against Insider Attack

[1]  Kim-Kwang Raymond Choo,et al.  Efficient and secure identity-based encryption scheme with equality test in cloud computing , 2017, Future Gener. Comput. Syst..

[2]  Qiang Tang,et al.  Public key encryption schemes supporting equality test with authorisation of different granularity , 2012, Int. J. Appl. Cryptogr..

[3]  Lin Sun,et al.  Certificateless Public Key Encryption with Equality Test , 2016, IACR Cryptol. ePrint Arch..

[4]  Zhang Yubo,et al.  Dual Server Identity-Based Encryption with Equality Test for Cloud Computing , 2017 .

[5]  Qiong Huang,et al.  Group ID-Based Encryption with Equality Test , 2019, ACISP.

[6]  Michael Scott,et al.  A Taxonomy of Pairing-Friendly Elliptic Curves , 2010, Journal of Cryptology.

[7]  Qiong Huang,et al.  A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack , 2018, ICCCS.

[8]  Qiang Tang,et al.  Public key encryption supporting plaintext equality test and user-specified authorization , 2012, Secur. Commun. Networks.

[9]  Sha Ma,et al.  Identity-based encryption with outsourced equality test in cloud computing , 2016, Inf. Sci..

[10]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[11]  Victor Shoup,et al.  Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..

[12]  Huaxiong Wang,et al.  Public Key Encryption with Equality Test in the Standard Model , 2020, IACR Cryptol. ePrint Arch..

[13]  Xiaoshuai Zhang,et al.  Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings , 2016, IACR Cryptol. ePrint Arch..

[14]  Kaibin Huang,et al.  PKE-AET: Public Key Encryption with Authorized Equality Test , 2015, Comput. J..

[15]  Hung-Min Sun,et al.  A New Public Key Encryption with Equality Test , 2015, NSS.

[16]  Mingwu Zhang,et al.  Public Key Encryption with Delegated Equality Test in a Multi-User Setting , 2015, Comput. J..

[17]  Sha Ma,et al.  A General Two-Server Cryptosystem Supporting Complex Queries , 2017, WISA.

[18]  HweeHwa Pang,et al.  Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases , 2017, Comput. J..

[19]  Yi Mu,et al.  ID-Based Encryption with Equality Test Against Insider Attack , 2017, ACISP.

[20]  Jian Shen,et al.  Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage , 2019, IEEE Access.

[21]  Geong Sen Poh,et al.  Searchable Symmetric Encryption , 2017, ACM Comput. Surv..

[22]  Guomin Yang,et al.  Probabilistic Public Key Encryption with Equality Test , 2010, CT-RSA.

[23]  Dan Boneh,et al.  Efficient Selective Identity-Based Encryption Without Random Oracles , 2011, Journal of Cryptology.

[24]  Kenneth G. Paterson,et al.  Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..

[25]  Mingwu Zhang,et al.  Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization , 2015, IEEE Transactions on Information Forensics and Security.

[26]  TangQiang Public key encryption supporting plaintext equality test and user-specified authorization , 2012 .

[27]  Huaxiong Wang,et al.  Semi-generic construction of public key encryption and identity-based encryption with equality test , 2016, Inf. Sci..

[28]  Huaxiong Wang,et al.  Public key encryption with equality test in the standard model , 2020, Inf. Sci..

[29]  Qiang Tang,et al.  Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization , 2011, ACISP.