Dynamic Verifiable Search Over Encrypted Data in Untrusted Clouds
暂无分享,去创建一个
Tao Peng | Qin Liu | Xuhui Liu | Xiaohong Nie | Yapin Lin
[1] Jie Wu,et al. Multi-task assignment for crowdsensing in mobile social networks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[2] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[3] Jan Camenisch,et al. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.
[4] Jie Wu,et al. Towards Differential Query Services in Cost-Efficient Clouds , 2014, IEEE Transactions on Parallel and Distributed Systems.
[5] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[6] Kaoru Kurosawa,et al. UC-Secure Searchable Symmetric Encryption , 2012, Financial Cryptography.
[7] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[8] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[9] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[10] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[11] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[12] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[13] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[14] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[15] Jie Wu,et al. Time-based proxy re-encryption scheme for secure data sharing in a cloud environment , 2014, Inf. Sci..
[16] Josh Benaloh,et al. One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) , 1994, EUROCRYPT.
[17] Gaogang Xie,et al. Sequential and adaptive sampling for matrix completion in network monitoring systems , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[18] Kaoru Kurosawa,et al. How to Update Documents Verifiably in Searchable Symmetric Encryption , 2013, CANS.