Fine-Grained Comparable Encryption Scheme in Multi-User Settings
暂无分享,去创建一个
[1] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[2] Mark Zhandry,et al. Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation , 2015, EUROCRYPT.
[3] Yong Yu,et al. Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[4] Jun Furukawa. Request-Based Comparable Encryption , 2013, ESORICS.
[5] Fei Xue,et al. Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation , 2018, Int. J. Wirel. Mob. Comput..
[6] Oladayo Olufemi Olakanmi,et al. An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms , 2019, Int. J. Cloud Appl. Comput..
[7] Keita Xagawa,et al. Cryptanalysis of Comparable Encryption in SIGMOD'16 , 2017, SIGMOD Conference.
[8] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[9] Rajkumar Buyya,et al. Next generation cloud computing: New trends and research directions , 2017, Future Gener. Comput. Syst..
[10] Xiaofeng Chen,et al. Efficient request-based comparable encryption scheme based on sliding window method , 2016, Soft Comput..
[11] Siu-Ming Yiu,et al. HybridORAM: Practical oblivious cloud storage with constant bandwidth , 2018, Inf. Sci..
[12] Fengjun Li,et al. Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method , 2019, IEEE Access.
[13] Panagiotis Karras,et al. Adaptive Indexing over Encrypted Numeric Data , 2016, SIGMOD Conference.
[14] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[15] Nickolai Zeldovich,et al. An Ideal-Security Protocol for Order-Preserving Encoding , 2013, 2013 IEEE Symposium on Security and Privacy.