ID-Based Encryption with Equality Test Against Insider Attack
暂无分享,去创建一个
Yi Mu | Tong Wu | Sha Ma | Shengke Zeng | Y. Mu | Sha Ma | Shengke Zeng | Tong Wu
[1] Qiang Tang,et al. Public key encryption schemes supporting equality test with authorisation of different granularity , 2012, Int. J. Appl. Cryptogr..
[2] Mingwu Zhang,et al. Public Key Encryption with Delegated Equality Test in a Multi-User Setting , 2015, Comput. J..
[3] Daniel A. Mayer,et al. Verifiable private equality test: enabling unbiased 2-party reconciliation on ordered sets in the malicious model , 2012, ASIACCS '12.
[4] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[5] Mingwu Zhang,et al. Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization , 2015, IEEE Transactions on Information Forensics and Security.
[6] Peng Jiang,et al. Online/Offline Ciphertext Retrieval on Resource Constrained Devices , 2016, Computer/law journal.
[7] Kaibin Huang,et al. PKE-AET: Public Key Encryption with Authorized Equality Test , 2015, Comput. J..
[8] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[9] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[10] Fuchun Guo,et al. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage , 2016, IEEE Transactions on Information Forensics and Security.
[11] Sha Ma,et al. Identity-based encryption with outsourced equality test in cloud computing , 2016, Inf. Sci..
[12] Guomin Yang,et al. Probabilistic Public Key Encryption with Equality Test , 2010, CT-RSA.
[13] Qiang Tang,et al. Public key encryption supporting plaintext equality test and user-specified authorization , 2012, Secur. Commun. Networks.
[14] Kenneth G. Paterson,et al. Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..