Identity-based encryption with authorized equivalence test for cloud-assisted IoT

[1]  Attila A. Yavuz,et al.  Lattice-Based Public Key Searchable Encryption from Experimental Perspectives , 2020, IEEE Transactions on Dependable and Secure Computing.

[2]  Hu Xiong,et al.  An efficient certificateless public key cryptography with authorized equality test in IIoT , 2020, J. Ambient Intell. Humaniz. Comput..

[3]  Hu Xiong,et al.  Server-Aided Attribute-Based Signature Supporting Expressive Access Structures for Industrial Internet of Things , 2020, IEEE Transactions on Industrial Informatics.

[4]  Fagen Li,et al.  IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks , 2019, Mobile Networks and Applications.

[5]  Fagen Li,et al.  An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid , 2019, J. Syst. Archit..

[6]  Hao Zhang,et al.  Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing , 2019, IEEE Systems Journal.

[7]  Hao Zhang,et al.  Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing , 2019, Future Gener. Comput. Syst..

[8]  Hu Xiong,et al.  Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles , 2019, IEEE Access.

[9]  Jian Shen,et al.  Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage , 2019, IEEE Access.

[10]  Yang Lu,et al.  Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems , 2018, Cluster Computing.

[11]  Johnny S. Wong,et al.  Cloud and IoT-based emerging services systems , 2018, Cluster Computing.

[12]  Natalia G. Miloslavskaya,et al.  Internet of Things: information security challenges and solutions , 2018, Cluster Computing.

[13]  Robert H. Deng,et al.  Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices , 2018, IEEE Transactions on Industrial Informatics.

[14]  Yanan Zhao,et al.  A Heterogeneous Systems Public Key Encryption with Equality Test in Smart City , 2018 .

[15]  Kim-Kwang Raymond Choo,et al.  Efficient Identity-Based Encryption Scheme with Equality Test in Smart City , 2018, IEEE Transactions on Sustainable Computing.

[16]  Kim-Kwang Raymond Choo,et al.  Efficient and secure identity-based encryption scheme with equality test in cloud computing , 2017, Future Gener. Comput. Syst..

[17]  Ming Wang,et al.  Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks , 2017, IEEE Access.

[18]  Xiaolei Dong,et al.  Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.

[19]  Xiaohui Liang,et al.  Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.

[20]  Huaxiong Wang,et al.  Semi-generic construction of public key encryption and identity-based encryption with equality test , 2016, Inf. Sci..

[21]  Jianhong Zhang,et al.  Efficient public key encryption with revocable keyword search in cloud computing , 2016, Cluster Computing.

[22]  Sha Ma,et al.  Identity-based encryption with outsourced equality test in cloud computing , 2016, Inf. Sci..

[23]  Kaibin Huang,et al.  PKE-AET: Public Key Encryption with Authorized Equality Test , 2015, Comput. J..

[24]  Schahram Dustdar,et al.  Principles for Engineering IoT Cloud Systems , 2015, IEEE Cloud Computing.

[25]  Mingwu Zhang,et al.  Public Key Encryption with Delegated Equality Test in a Multi-User Setting , 2015, Comput. J..

[26]  Mingwu Zhang,et al.  Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization , 2015, IEEE Transactions on Information Forensics and Security.

[27]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[28]  Gerhard P Hancke,et al.  Introduction to Industrial Control Networks , 2013, IEEE Communications Surveys & Tutorials.

[29]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[30]  Qiang Tang,et al.  Public key encryption supporting plaintext equality test and user-specified authorization , 2012, Secur. Commun. Networks.

[31]  Qiang Tang,et al.  Public key encryption schemes supporting equality test with authorisation of different granularity , 2012, Int. J. Appl. Cryptogr..

[32]  Xi Fang,et al.  3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .

[33]  Qiang Tang,et al.  Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization , 2011, ACISP.

[34]  A. Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[35]  Guomin Yang,et al.  Probabilistic Public Key Encryption with Equality Test , 2010, CT-RSA.

[36]  Anis Laouiti,et al.  Vehicle Ad Hoc networks: applications and related technical issues , 2008, IEEE Communications Surveys & Tutorials.

[37]  Mihir Bellare,et al.  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.

[38]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[39]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[40]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[41]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.