Efficient designated server identity-based encryption with conjunctive keyword search
暂无分享,去创建一个
[1] Xinyi Huang,et al. Dual trapdoor identity-based encryption with keyword search , 2017, Soft Comput..
[2] Yiwei Thomas Hou,et al. Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud , 2016, IEEE Transactions on Parallel and Distributed Systems.
[3] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[4] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[5] Bo Zhang,et al. An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..
[6] Jiguo Li,et al. Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage , 2017, Int. J. Commun. Syst..
[7] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[8] Kihyun Kim,et al. Public Key Encryption with Conjunctive Field Keyword Search , 2004, WISA.
[9] Yi Mu,et al. Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group , 2016, Journal of Computer Science and Technology.
[10] Koji Tomida,et al. Ciphertext Divided Anonymous HIBE and Its Transformation to Identity-Based Encryption with Keyword Search , 2015, J. Inf. Process..
[11] Jiguo Li,et al. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing , 2017, IEEE Transactions on Services Computing.
[12] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[13] Yong Wang,et al. Chaotic map-based time-aware multi-keyword search scheme with designated server , 2015, Wirel. Commun. Mob. Comput..
[14] Jiguo Li,et al. Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation , 2014, International Journal of Information Security.
[15] Bok-Min Goi,et al. Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes , 2008, ATC.
[16] Shouhuai Xu,et al. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[17] Zhi Guan,et al. Fuzzy Keyword Search over Encrypted Data in the Public Key Setting , 2013, WAIM.
[18] Xiaohui Liang,et al. Proxy re-encryption with keyword search , 2010, Inf. Sci..
[19] Koji Tomida,et al. Keyword Searchable Encryption with Access Control from a Certain Identity-Based Encryption , 2014 .
[20] Fuchun Guo,et al. Server-Aided Public Key Encryption With Keyword Search , 2016, IEEE Transactions on Information Forensics and Security.
[21] Yuh-Min Tseng,et al. Efficient searchable ID-based encryption with a designated server , 2014, Ann. des Télécommunications.
[22] Dengguo Feng,et al. Expressive and Secure Searchable Encryption in the Public Key Setting , 2014, ISC.
[23] Yong Wang,et al. ID-Based Encryption with Keyword Search Scheme from Bilinear Pairings , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[24] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[25] Willy Susilo,et al. A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle , 2009, CANS.
[26] Jiguo Li,et al. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage , 2017, IEEE Transactions on Services Computing.
[27] Jiguo Li,et al. A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme , 2016, Comput. J..
[28] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[29] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.
[30] Dong Hoon Lee,et al. Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data , 2006, Secure Data Management.
[31] Pil Joong Lee,et al. Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System , 2007, Pairing.
[32] Lifeng Guo,et al. Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage , 2015, Journal of Medical Systems.
[33] Chengyu Hu,et al. An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its Extensions , 2012, J. Comput..
[34] Yang Lu,et al. Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage , 2016, Secur. Commun. Networks.
[35] Yu-Chi Chen,et al. SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks , 2015, Comput. J..
[36] Fuchun Guo,et al. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage , 2016, IEEE Transactions on Information Forensics and Security.
[37] M. Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.
[38] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[39] Qiang Tang,et al. Public-Key Encryption with Registered Keyword Search , 2009, EuroPKI.
[40] Dong Hoon Lee,et al. Improved searchable public key encryption with designated tester , 2009, ASIACCS '09.
[41] Jiguo Li,et al. Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing , 2016, KSII Trans. Internet Inf. Syst..
[42] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[43] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[44] Dong Hoon Lee,et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester , 2010, J. Syst. Softw..