Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices
暂无分享,去创建一个
Laurence T. Yang | Zheng Yan | Wei Wang | Peng Xu | Dongli Liu | Wei Wang | L. Yang | Dongliang Liu | Zheng Yan | Peng Xu
[1] Hirozumi Yamaguchi,et al. Edge Computing and IoT Based Research for Building Safe Smart Cities Resistant to Disasters , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[2] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[3] Paulo S. L. M. Barreto,et al. Pairing-Friendly Elliptic Curves of Prime Order , 2005, Selected Areas in Cryptography.
[4] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[5] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[6] Josep Domingo-Ferrer,et al. Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search , 2015, IEEE Transactions on Information Forensics and Security.
[7] Yang Lu,et al. Industry 4.0: A survey on technologies, applications and open research issues , 2017, J. Ind. Inf. Integr..
[8] Jianwei Liu,et al. Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control , 2016, ESORICS.
[9] Maode Ma,et al. Semantic Searchable Encryption Scheme Based on Lattice in Quantum-Era , 2016, J. Inf. Sci. Eng..
[10] Bing Chen,et al. Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.
[11] Zhenfu Cao,et al. CCA-Secure Proxy Re-Encryption without Pairings , 2009, IACR Cryptol. ePrint Arch..
[12] Xavier Masip-Bruin,et al. Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud computing systems , 2016, IEEE Wireless Communications.
[13] Vishal Saraswat,et al. Public Key Encryption with Searchable Keywords Based on Jacobi Symbols , 2007, INDOCRYPT.
[14] Sébastien Canard,et al. Delegating a Pairing Can Be Both Secure and Efficient , 2014, ACNS.
[15] Hai Jin,et al. Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks , 2018, IEEE Transactions on Industrial Informatics.
[16] Veronika Kuchta,et al. Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption , 2016, ATIS.
[17] Yun Liu,et al. Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing , 2018, IEEE Transactions on Industrial Informatics.
[18] Erik Elmroth,et al. Connecting Fog and Cloud Computing , 2017, IEEE Cloud Comput..
[19] Jorge Pereira,et al. IIoTEED: An Enhanced, Trusted Execution Environment for Industrial IoT Edge Devices , 2017, IEEE Internet Computing.
[20] Attila A. Yavuz,et al. Lattice-Based Public Key Searchable Encryption from Experimental Perspectives , 2020, IEEE Transactions on Dependable and Secure Computing.
[21] Fangguo Zhang,et al. Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible , 2015, AsiaCCS.
[22] Sanjit Chatterjee,et al. On cryptographic protocols employing asymmetric pairings - The role of Ψ revisited , 2011, Discret. Appl. Math..
[23] Tao Zhang,et al. Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.
[24] Wei Wang,et al. Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack , 2013, IEEE Transactions on Computers.
[25] Thomas Peyrin,et al. GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption , 2017, CHES.