Controllable privacy preserving search based on symmetric predicate encryption in cloud storage
暂无分享,去创建一个
[1] Jonathan Katz,et al. On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations , 2009, ASIACRYPT.
[2] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[3] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[4] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[5] Allison Bishop,et al. New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts , 2010, IACR Cryptol. ePrint Arch..
[6] Vincenzo Iovino,et al. Private-Key Hidden Vector Encryption with Key Confidentiality , 2009, CANS.
[7] M. Scott. Implementing cryptographic pairings , 2007 .
[8] Dingfeng Ye,et al. Delegate predicate encryption and its application to anonymous authentication , 2009, ASIACCS '09.
[9] Augusto Ciuffoletti. Secure token passing at application level , 2010, Future Gener. Comput. Syst..
[10] Antonio F. Gómez-Skarmeta,et al. Semantic-based authorization architecture for Grid , 2011, Future Gener. Comput. Syst..
[11] Valentina Casola,et al. The CloudGrid approach: Security analysis and performance evaluation , 2013, Future Gener. Comput. Syst..
[12] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[13] Vincenzo Iovino,et al. Hidden-Vector Encryption with Groups of Prime Order , 2008, Pairing.
[14] Tatsuaki Okamoto,et al. Hierarchical Predicate Encryption for Inner-Products , 2009, ASIACRYPT.
[15] Jianxin Li,et al. CyberGuarder: A virtualization security assurance architecture for green cloud computing , 2012, Future Gener. Comput. Syst..
[16] David Mandell Freeman,et al. Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups , 2010, EUROCRYPT.
[17] Siu-Ming Yiu,et al. Acceleration of Composite Order Bilinear Pairing on Graphics Hardware , 2012, ICICS.
[18] Sanjit Chatterjee,et al. On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings , 2010, WAIFI.
[19] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[20] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.
[21] Eun-Jun Yoon,et al. A secure broadcasting cryptosystem and its application to grid computing , 2011, Future Gener. Comput. Syst..
[22] Douglas Stebila,et al. Predicate-Based Key Exchange , 2010, ACISP.
[23] Elaine Shi,et al. Delegating Capabilities in Predicate Encryption Systems , 2008, ICALP.
[24] Ming Li,et al. Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.