Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT
暂无分享,去创建一个
Hai Jin | Laurence T. Yang | Xiaolan Tang | Peng Xu | Wei Wang | Hai Jin | L. Yang | Peng Xu | Wei Wang | Xiaolan Tang
[1] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[2] Pil Joong Lee,et al. Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System , 2007, Pairing.
[3] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[4] Michael K. Reiter,et al. Time-Scoped Searching of Encrypted Audit Logs , 2004, ICICS.
[5] Dawn Song,et al. Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption∗ , 2006 .
[6] Pieter H. Hartel,et al. Public-Key Encryption with Delegated Search , 2011, ACNS.
[7] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[8] Tsuyoshi Takagi,et al. Efficient Conjunctive Keyword-Searchable Encryption , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[9] Qiang Tang,et al. Towards asymmetric searchable encryption with message recovery and flexible search authorization , 2013, ASIA CCS '13.
[10] Ye Zhang,et al. Anonymous Fuzzy Identity-Based Encryption for Similarity Search , 2010, ISAAC.
[11] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[12] Kihyun Kim,et al. Public Key Encryption with Conjunctive Field Keyword Search , 2004, WISA.
[13] Josep Domingo-Ferrer,et al. Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search , 2015, IEEE Transactions on Information Forensics and Security.
[14] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[15] Mingwu Zhang,et al. Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation , 2017, Science China Information Sciences.
[16] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[17] Lucas Ballard,et al. Achieving Efficient Conjunctive Keyword Searches over Encrypted Data , 2005, ICICS.
[18] Wei Wang,et al. Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack , 2013, IEEE Transactions on Computers.
[19] M. Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.