A shareable keyword search over encrypted data in cloud computing
暂无分享,去创建一个
Chi-Yao Weng | Hung-Min Sun | Mu-En Wu | Raylin Tso | Li Xu | Lun-Pin Yuan
[1] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[2] Jung Hee Cheon,et al. Batch Verifications with ID-Based Signatures , 2004, ICISC.
[3] Jin Li,et al. Enabling efficient and secure data sharing in cloud computing , 2014, Concurr. Comput. Pract. Exp..
[4] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[5] Qiang Tang,et al. Towards asymmetric searchable encryption with message recovery and flexible search authorization , 2013, ASIA CCS '13.
[6] Florian Kerschbaum. Secure conjunctive keyword searches for unstructured text , 2011, 2011 5th International Conference on Network and System Security.
[7] Yanjiang Yang,et al. Multi-User Private Keyword Search for Cloud Computing , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[8] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[9] Ming Li,et al. Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.
[10] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[11] A. Tripathy,et al. A secure and searchable data storage in Cloud computing , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[12] Dong Hoon Lee,et al. Improved searchable public key encryption with designated tester , 2009, ASIACCS '09.
[13] Hua Zhang,et al. An efficient Public Key Encryption with Conjunctive Keyword Search scheme based on pairings , 2012, 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content.
[14] Pieter H. Hartel,et al. Public-Key Encryption with Delegated Search , 2011, ACNS.
[15] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[16] Satoshi Fujita,et al. Cost-Effective Replication Schemes for Query Load Balancing in DHT-Based Peer-to-Peer File Searches , 2014, J. Inf. Process. Syst..
[17] Im-Yeong Lee,et al. A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage , 2013, J. Inf. Process. Syst..
[18] Robert H. Deng,et al. Expressive search on encrypted data , 2013, ASIA CCS '13.
[19] Julien Bringer,et al. Embedding edit distance to enable private keyword search , 2012, Human-centric Computing and Information Sciences.
[20] Masami Mohri,et al. Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating , 2015, Human-centric Computing and Information Sciences.
[21] Chen-Mou Cheng,et al. Design and implementation of multi-user secure indices for encrypted cloud storage , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.
[22] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[23] Jie Wu,et al. Secure and privacy preserving keyword searching for cloud storage services , 2012, J. Netw. Comput. Appl..
[24] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[25] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[26] Yong Wang,et al. ID-Based Encryption with Keyword Search Scheme from Bilinear Pairings , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[27] Peishun Wang,et al. Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups , 2008, CANS.
[28] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[29] Jie Wu,et al. An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing , 2009, 2009 International Conference on Computational Science and Engineering.
[30] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.