Searchable Attribute-Based Encryption Protocol with Hidden Keywords in Cloud
暂无分享,去创建一个
Fang Qi | Wenbo Wang | Xing Chang | Zhe Tang
[1] Yanmei Li,et al. Traceable and Complete Fine-Grained Revocable Multi-authority Attribute-Based Encryption Scheme in Social Network , 2017, SpaCCS.
[2] Fang Qi,et al. Efficient Private Matching Scheme for Friend Information Exchange , 2015, ICA3PP.
[3] Guojun Wang,et al. A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks , 2016, SpaCCS.
[4] Xiaolei Dong,et al. TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[5] Xiaolei Dong,et al. Securing m-healthcare social networks: challenges, countermeasures and future directions , 2013, IEEE Wireless Communications.
[6] Ming Li,et al. FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[7] Yaling Zhang,et al. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage , 2018, PloS one.
[8] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[9] Yang Xiaoyuan,et al. A Fully Secure KP-ABE Scheme in the Standard Model , 2015 .
[10] Shouhuai Xu,et al. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[11] Xiaoyuan Yang,et al. Secure Cloud File System with Attribute Based Encryption , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.
[12] Robert H. Deng,et al. Adaptable key-policy attribute-based encryption with time interval , 2017, Soft Comput..
[13] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[14] Youngho Park,et al. A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure , 2015, J. Inf. Sci. Eng..
[15] Wujun Zhang,et al. Attribute-Based Fine-Grained Access Control with User Revocation , 2014, ICT-EurAsia.