iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search
暂无分享,去创建一个
[1] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[2] Fu-Kuo Tseng,et al. Ensuring correctness of range searches on encrypted cloud data , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[3] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[4] László Babai,et al. Proceedings of the thirty-sixth annual ACM symposium on Theory of computing , 2004, STOC 2004.
[5] Rafail Ostrovsky,et al. Batch codes and their applications , 2004, STOC '04.
[6] Vincenzo Iovino,et al. Hidden-Vector Encryption with Groups of Prime Order , 2008, Pairing.
[7] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[8] Harriet Ortiz,et al. Proceedings of the twenty-second annual ACM symposium on Theory of computing , 1990, STOC 1990.
[9] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[10] Dimitris Gritzalis,et al. Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation , 2011, TrustBus.
[11] Cong Wang,et al. Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.
[12] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[13] P. Mell,et al. SP 800-145. The NIST Definition of Cloud Computing , 2011 .
[14] Rafail Ostrovsky,et al. Cryptography from Anonymity , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[15] Kihyun Kim,et al. Public Key Encryption with Conjunctive Field Keyword Search , 2004, WISA.
[16] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[17] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[18] Rafail Ostrovsky,et al. Efficient computation on oblivious RAMs , 1990, STOC '90.
[19] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[20] Yongge Wang,et al. Public Key Cryptography Standards: PKCS , 2012, ArXiv.
[21] Fu-Kuo Tseng,et al. Toward Authenticated and Complete Query Results from Cloud Storages , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[22] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[23] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[24] Jakob Jonsson,et al. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1 , 2003, RFC.