Efficient Group ID-Based Encryption With Equality Test Against Insider Attack
暂无分享,去创建一个
Qiong Huang | Ximing Li | Yunhao Ling | Yunzhi Ling | Ma Sha | Yijian Zhong | Ximing Li | Sha Ma | Yunzhi Ling | Qiong Huang | Yijian Zhong | Yunhao Ling
[1] Kim-Kwang Raymond Choo,et al. Efficient and secure identity-based encryption scheme with equality test in cloud computing , 2017, Future Gener. Comput. Syst..
[2] Qiang Tang,et al. Public key encryption schemes supporting equality test with authorisation of different granularity , 2012, Int. J. Appl. Cryptogr..
[3] Lin Sun,et al. Certificateless Public Key Encryption with Equality Test , 2016, IACR Cryptol. ePrint Arch..
[4] Zhang Yubo,et al. Dual Server Identity-Based Encryption with Equality Test for Cloud Computing , 2017 .
[5] Qiong Huang,et al. Group ID-Based Encryption with Equality Test , 2019, ACISP.
[6] Michael Scott,et al. A Taxonomy of Pairing-Friendly Elliptic Curves , 2010, Journal of Cryptology.
[7] Qiong Huang,et al. A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack , 2018, ICCCS.
[8] Qiang Tang,et al. Public key encryption supporting plaintext equality test and user-specified authorization , 2012, Secur. Commun. Networks.
[9] Sha Ma,et al. Identity-based encryption with outsourced equality test in cloud computing , 2016, Inf. Sci..
[10] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[11] Victor Shoup,et al. Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..
[12] Huaxiong Wang,et al. Public Key Encryption with Equality Test in the Standard Model , 2020, IACR Cryptol. ePrint Arch..
[13] Xiaoshuai Zhang,et al. Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings , 2016, IACR Cryptol. ePrint Arch..
[14] Kaibin Huang,et al. PKE-AET: Public Key Encryption with Authorized Equality Test , 2015, Comput. J..
[15] Hung-Min Sun,et al. A New Public Key Encryption with Equality Test , 2015, NSS.
[16] Mingwu Zhang,et al. Public Key Encryption with Delegated Equality Test in a Multi-User Setting , 2015, Comput. J..
[17] Sha Ma,et al. A General Two-Server Cryptosystem Supporting Complex Queries , 2017, WISA.
[18] HweeHwa Pang,et al. Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases , 2017, Comput. J..
[19] Yi Mu,et al. ID-Based Encryption with Equality Test Against Insider Attack , 2017, ACISP.
[20] Jian Shen,et al. Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage , 2019, IEEE Access.
[21] Geong Sen Poh,et al. Searchable Symmetric Encryption , 2017, ACM Comput. Surv..
[22] Guomin Yang,et al. Probabilistic Public Key Encryption with Equality Test , 2010, CT-RSA.
[23] Dan Boneh,et al. Efficient Selective Identity-Based Encryption Without Random Oracles , 2011, Journal of Cryptology.
[24] Kenneth G. Paterson,et al. Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..
[25] Mingwu Zhang,et al. Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization , 2015, IEEE Transactions on Information Forensics and Security.
[26] TangQiang. Public key encryption supporting plaintext equality test and user-specified authorization , 2012 .
[27] Huaxiong Wang,et al. Semi-generic construction of public key encryption and identity-based encryption with equality test , 2016, Inf. Sci..
[28] Huaxiong Wang,et al. Public key encryption with equality test in the standard model , 2020, Inf. Sci..
[29] Qiang Tang,et al. Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization , 2011, ACISP.