A Secure Data Sharing Scheme with Designated Server
暂无分享,去创建一个
Jixin Ma | Jing Qin | Binrui Zhu | Jiameng Sun | Jixin Ma | Jiameng Sun | Jing Qin | Binrui Zhu
[1] Shekhar Verma,et al. Improved secure server-designated public key encryption with keyword search , 2017, 2017 Conference on Information and Communication Technology (CICT).
[2] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[3] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[4] Hideki Imai,et al. Combining Public Key Encryption with Keyword Search and Public Key Encryption , 2009, IEICE Trans. Inf. Syst..
[5] Li Xiao,et al. MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data , 2017 .
[6] Jixin Ma,et al. Fuzzy matching: multi-authority attribute searchable encryption without central authority , 2017, Soft Computing.
[7] Willy Susilo,et al. Public key encryption with keyword search secure against keyword guessing attacks without random oracle , 2013, Inf. Sci..
[8] M. Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.
[9] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[10] Qiong Huang,et al. An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks , 2017, Inf. Sci..
[11] Dongdai Lin,et al. Generic constructions of integrated PKE and PEKS , 2014, Designs, Codes and Cryptography.
[12] Devesh C. Jinwala,et al. Multiuser Searchable Encryption with Token Freshness Verification , 2017, Secur. Commun. Networks.
[13] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[14] David Pointcheval,et al. REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform , 2001, CT-RSA.
[15] Shouhuai Xu,et al. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[16] Jiankun Hu,et al. A general transformation from KP-ABE to searchable encryption , 2014, Future Gener. Comput. Syst..
[17] Peng Jiang,et al. Private Keyword-Search for Database Systems Against Insider Attacks , 2017, Journal of Computer Science and Technology.
[18] Joonsang Baek,et al. On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search , 2006, ISC.
[19] Ting Yu,et al. PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data , 2016, 2016 IEEE International Conference on Web Services (ICWS).
[20] Dong Hoon Lee,et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester , 2010, J. Syst. Softw..
[21] Jixin Ma,et al. The Public Verifiability of Public Key Encryption with Keyword Search , 2017, MONAMI.
[22] Wei Wang,et al. Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack , 2013, IEEE Transactions on Computers.
[23] Xiaojun Zhang,et al. A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage , 2018, Secur. Commun. Networks.
[24] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.