Deniable search of encrypted cloud-storage data
暂无分享,去创建一个
[1] Maged Hamada Ibrahim,et al. A Method for Obtaining Deniable Public-Key Encryption , 2009, Int. J. Netw. Secur..
[2] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[3] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[4] Fangguo Zhang,et al. Deniable Searchable Symmetric Encryption , 2017, Inf. Sci..
[5] Dong Hoon Lee,et al. Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data , 2006, Secure Data Management.
[6] Yangyang Zhang,et al. A based on blinded CP-ABE searchable encryption cloud storage service scheme , 2018, Int. J. Commun. Syst..
[7] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[8] Yi Mu,et al. Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud , 2018, IEEE Transactions on Information Forensics and Security.
[9] Marina Blanton,et al. Deniable cloud storage: sharing files via public-key deniability , 2010, WPES '10.
[10] Marek Klonowski,et al. Practical Deniable Encryption , 2008, SOFSEM.
[11] Jiankun Hu,et al. A general transformation from KP-ABE to searchable encryption , 2014, Future Gener. Comput. Syst..
[12] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[13] Tao Zhang,et al. A lightweight secure conjunctive keyword search scheme in hybrid cloud , 2019, Future Gener. Comput. Syst..
[14] Atsuko Miyaji,et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2009, Int. J. Appl. Cryptogr..
[15] Lifeng Guo,et al. A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms , 2020, IEEE Access.
[16] Xiaofen Wang,et al. Lightweight Searchable Encryption Protocol for Industrial Internet of Things , 2021, IEEE Transactions on Industrial Informatics.
[17] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[18] Willy Susilo,et al. Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.
[19] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[20] Shouhuai Xu,et al. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[21] Zhiwei Wang,et al. CP-ABE with Hidden Policy from Waters Efficient Construction , 2016, Int. J. Distributed Sens. Networks.
[22] Brent Waters,et al. Bi-Deniable Public-Key Encryption , 2011, CRYPTO.
[23] Jiguo Li,et al. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage , 2017, IEEE Transactions on Services Computing.
[24] P. MuraliKrishna,et al. SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .
[25] Markus Dürmuth,et al. Deniable Encryption with Negligible Detection Probability: An Interactive Construction , 2011, EUROCRYPT.
[26] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[27] Ximeng Liu,et al. Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud , 2021, IEEE Transactions on Dependable and Secure Computing.
[28] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[29] Yi Mu,et al. Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System , 2019, IEEE Access.
[30] Manik Lal Das,et al. KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption , 2022, IEEE Transactions on Services Computing.
[31] Yaling Zhang,et al. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage , 2018, PloS one.
[32] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[33] Robert H. Deng,et al. An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited , 2018, Comput. Networks.
[34] Rafail Ostrovsky,et al. Deniable Encryption , 1997, IACR Cryptol. ePrint Arch..
[35] Robert H. Deng,et al. Expressive CP-ABE with partially hidden access structures , 2012, ASIACCS '12.
[36] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[37] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[38] Allison Bishop,et al. Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting , 2012, EUROCRYPT.
[39] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.
[40] Mirco Musolesi,et al. Precise time-matching in chimpanzee allogrooming does not occur after a short delay , 2018, PloS one.
[41] Ratna Dutta,et al. Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext , 2013, ICICS.
[42] Xiaohua Jia,et al. Improving the proof of “Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms” , 2019, PloS one.
[43] Kazuki Yoneyama,et al. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.
[44] Chin-Laung Lei,et al. Audit-Free Cloud Storage via Deniable Attribute-Based Encryption , 2018, IEEE Transactions on Cloud Computing.
[45] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[46] Jianfeng Ma,et al. Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing , 2020, IEEE Transactions on Services Computing.
[47] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.