General Multi-key Searchable Encryption
暂无分享,去创建一个
Jin Li | Jun Yang | Zheli Liu | Chunfu Jia | Nan Shen | Chuan Fu | Zheli Liu | Jin Li | Chunfu Jia | Jun Yang | Nan Shen | Chuan Fu
[1] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[2] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[3] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Yogesh K. Gedam. Fuzzy Keyword Search Over Encrypted Data in Cloud Computing , 2014 .
[5] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[6] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[7] Robert H. Deng,et al. Private Query on Encrypted Data in Multi-user Settings , 2008, ISPEC.
[8] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[9] Nickolai Zeldovich,et al. Multi-Key Searchable Encryption , 2013, IACR Cryptol. ePrint Arch..
[10] Jin Li,et al. Hidden attribute-based signatures without anonymity revocation , 2010, Inf. Sci..
[11] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[12] Cong Wang,et al. Enhancing Attribute-Based Encryption with Attribute Hierarchy , 2009, 2009 Fourth International Conference on Communications and Networking in China.
[13] Kouichi Sakurai,et al. Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control , 2011, ICISC.
[14] Dalia Khader,et al. Public Key Encryption with Keyword Search Based on K-Resilient IBE , 2006, ICCSA.
[15] Xiaochun Cheng,et al. Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud , 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.
[16] Duncan S. Wong,et al. Secure Outsourced Attribute-Based Signatures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[17] Pieter H. Hartel,et al. Computationally Efficient Searchable Symmetric Encryption , 2010, Secure Data Management.
[18] Jin Li,et al. TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage , 2014, ACISP.
[19] Vishal Saraswat,et al. Public Key Encryption with Searchable Keywords Based on Jacobi Symbols , 2007, INDOCRYPT.
[20] Jin Li,et al. Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud , 2012, NSS.
[21] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[22] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[23] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.