Comments on a chaos-based public key encryption with keyword search scheme
暂无分享,去创建一个
[1] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[2] M. Baptista. Cryptography with chaos , 1998 .
[3] Mahdi Nouri,et al. The Parallel One-way Hash Function Based on Chebyshev-Halley Methods with Variable Parameter , 2014, Int. J. Comput. Commun. Control.
[4] Debiao He,et al. An efficient chaos‐based 2‐party key agreement protocol with provable security , 2017, Int. J. Commun. Syst..
[5] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[6] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[7] Cheng-Chi Lee,et al. An extended chaotic maps-based key agreement protocol with user anonymity , 2011, Nonlinear Dynamics.
[8] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[9] Xiaofeng Liao,et al. A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..
[10] Peng Gong,et al. Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials , 2013, Nonlinear Dynamics.
[11] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[12] Mario Marchese,et al. Statistical fingerprint‐based intrusion detection system (SF‐IDS) , 2017, Int. J. Commun. Syst..
[13] Ljupco Kocarev,et al. Public-key encryption with chaos. , 2004, Chaos.
[14] Liehuang Zhu,et al. Search pattern leakage in searchable encryption: Attacks and new construction , 2014, Inf. Sci..
[15] Chun-Ta Li,et al. An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services , 2015 .
[16] King-Hang Wang,et al. Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol” , 2016, Nonlinear Dynamics.
[17] Bok-Min Goi,et al. Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes , 2008, ATC.
[18] Zhihua Zhang,et al. C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications , 2015, Personal and Ubiquitous Computing.
[19] Dong Hoon Lee,et al. Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data , 2006, Secure Data Management.
[20] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[21] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .