Conjunctive Keywords Searchable Encryption Scheme Against Inside Keywords Guessing Attack from Lattice

[1]  Dong Hoon Lee,et al.  Trapdoor security in a searchable public-key encryption scheme with a designated tester , 2010, J. Syst. Softw..

[2]  Xiaojun Zhang,et al.  Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server , 2018, Wirel. Pers. Commun..

[3]  Oded Regev,et al.  On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.

[4]  Lei Liu,et al.  Can an element form a two-dimensional nanosheet of type 15 pentagons? , 2018, Computational Materials Science.

[5]  Qiong Huang,et al.  An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks , 2017, Inf. Sci..

[6]  Dan Boneh,et al.  Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE , 2010, CRYPTO.

[7]  Victor I. Chang,et al.  Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud , 2017, Multimedia Tools and Applications.

[8]  Xixi Yan,et al.  A Proxy Re-encryption with Keyword Search Scheme in Cloud Computing , 2018 .

[9]  Fei Kang,et al.  Keyword Search Over Encrypted Data in Cloud Computing from Lattices in the Standard Model , 2015, CloudCom-Asia.

[10]  Fuchun Guo,et al.  A New General Framework for Secure Public Key Encryption with Keyword Search , 2015, ACISP.

[11]  Mingwu Zhang,et al.  Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation , 2017, Science China Information Sciences.

[12]  Chen Guo,et al.  Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices , 2018, Trans. Emerg. Telecommun. Technol..

[13]  Oriol Farràs,et al.  Provably secure public-key encryption with conjunctive and subset keyword search , 2019, International Journal of Information Security.

[14]  Chris Peikert,et al.  Generating Shorter Bases for Hard Random Lattices , 2009, STACS.

[15]  Miklós Ajtai,et al.  Generating Hard Instances of the Short Basis Problem , 1999, ICALP.

[16]  Craig Gentry,et al.  Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..

[17]  Bo Zhang,et al.  An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..

[18]  Klaus Schöffmann,et al.  Learning laparoscopic video shot classification for gynecological surgery , 2018, Multimedia Tools and Applications.

[19]  Dong Hoon Lee,et al.  Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data , 2006, Secure Data Management.

[20]  Jie Zhao,et al.  Identity-based encryption with keyword search from lattice assumption , 2018, China Communications.

[21]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[22]  Attila A. Yavuz,et al.  Lattice-Based Public Key Searchable Encryption from Experimental Perspectives , 2020, IEEE Transactions on Dependable and Secure Computing.

[23]  Jie Wang,et al.  Verifiable Diversity Ranking Search Over Encrypted Outsourced Data , 2018 .

[24]  Veronika Kuchta,et al.  Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices , 2016, Mycrypt.

[25]  Huaxiong Wang,et al.  FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things , 2019, IEEE Transactions on Dependable and Secure Computing.

[26]  Brent Waters,et al.  Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.

[27]  Ron Steinfeld,et al.  Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation , 2019, AsiaCCS.

[28]  Amel Benazza-Benyahia,et al.  Efficient transform-based texture image retrieval techniques under quantization effects , 2016, Multimedia Tools and Applications.

[29]  Maode Ma,et al.  Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds , 2016, IEEE Transactions on Information Forensics and Security.