Conjunctive Keywords Searchable Encryption Scheme Against Inside Keywords Guessing Attack from Lattice
暂无分享,去创建一个
[1] Dong Hoon Lee,et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester , 2010, J. Syst. Softw..
[2] Xiaojun Zhang,et al. Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server , 2018, Wirel. Pers. Commun..
[3] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[4] Lei Liu,et al. Can an element form a two-dimensional nanosheet of type 15 pentagons? , 2018, Computational Materials Science.
[5] Qiong Huang,et al. An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks , 2017, Inf. Sci..
[6] Dan Boneh,et al. Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE , 2010, CRYPTO.
[7] Victor I. Chang,et al. Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud , 2017, Multimedia Tools and Applications.
[8] Xixi Yan,et al. A Proxy Re-encryption with Keyword Search Scheme in Cloud Computing , 2018 .
[9] Fei Kang,et al. Keyword Search Over Encrypted Data in Cloud Computing from Lattices in the Standard Model , 2015, CloudCom-Asia.
[10] Fuchun Guo,et al. A New General Framework for Secure Public Key Encryption with Keyword Search , 2015, ACISP.
[11] Mingwu Zhang,et al. Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation , 2017, Science China Information Sciences.
[12] Chen Guo,et al. Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices , 2018, Trans. Emerg. Telecommun. Technol..
[13] Oriol Farràs,et al. Provably secure public-key encryption with conjunctive and subset keyword search , 2019, International Journal of Information Security.
[14] Chris Peikert,et al. Generating Shorter Bases for Hard Random Lattices , 2009, STACS.
[15] Miklós Ajtai,et al. Generating Hard Instances of the Short Basis Problem , 1999, ICALP.
[16] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[17] Bo Zhang,et al. An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..
[18] Klaus Schöffmann,et al. Learning laparoscopic video shot classification for gynecological surgery , 2018, Multimedia Tools and Applications.
[19] Dong Hoon Lee,et al. Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data , 2006, Secure Data Management.
[20] Jie Zhao,et al. Identity-based encryption with keyword search from lattice assumption , 2018, China Communications.
[21] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[22] Attila A. Yavuz,et al. Lattice-Based Public Key Searchable Encryption from Experimental Perspectives , 2020, IEEE Transactions on Dependable and Secure Computing.
[23] Jie Wang,et al. Verifiable Diversity Ranking Search Over Encrypted Outsourced Data , 2018 .
[24] Veronika Kuchta,et al. Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices , 2016, Mycrypt.
[25] Huaxiong Wang,et al. FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things , 2019, IEEE Transactions on Dependable and Secure Computing.
[26] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[27] Ron Steinfeld,et al. Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation , 2019, AsiaCCS.
[28] Amel Benazza-Benyahia,et al. Efficient transform-based texture image retrieval techniques under quantization effects , 2016, Multimedia Tools and Applications.
[29] Maode Ma,et al. Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds , 2016, IEEE Transactions on Information Forensics and Security.