Semantic Searchable Encryption Scheme Based on Lattice in Quantum-Era
暂无分享,去创建一个
[1] Craig Gentry,et al. A Simple BGN-Type Cryptosystem from LWE , 2010, EUROCRYPT.
[2] Xiaochun Cheng,et al. Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud , 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.
[3] Jonathan Katz,et al. A Group Signature Scheme from Lattice Assumptions , 2010, IACR Cryptol. ePrint Arch..
[4] Xiaohui Liang,et al. SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing , 2014, Secur. Commun. Networks.
[5] Dongho Won,et al. A Novel Privacy-Enhanced AMI System Using Searchable and Homomorphic Encryption Techniques , 2012, ICHIT.
[6] Dan Boneh,et al. Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE , 2010, CRYPTO.
[7] Yuefei Zhu,et al. Efficient Public Key Encryption with Keyword Search Schemes from Pairings , 2007, Inscrypt.
[8] Shundong Li,et al. Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor , 2012, PAISI.
[9] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[10] Yuefei Zhu,et al. Public Key Encryption with Keyword Search from Lattices , 2013 .
[11] Jingguo Bi,et al. Lattice-based Identity-Based Broadcast Encryption , 2010 .
[12] Ming Li,et al. Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.
[13] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[14] Dawu Gu,et al. On Improving the Performance of Public Key Encryption with Keyword Search , 2012, 2012 International Conference on Cloud and Service Computing.
[15] David Cash,et al. How to Delegate a Lattice Basis , 2009, IACR Cryptol. ePrint Arch..
[16] Dan Boneh,et al. Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.
[17] Yael Tauman Kalai,et al. Robustness of the Learning with Errors Assumption , 2010, ICS.
[18] Chris Peikert,et al. Public-key cryptosystems from the worst-case shortest vector problem: extended abstract , 2009, STOC '09.
[19] Beixing Deng,et al. Learning with error based searchable encryption scheme , 2012 .
[20] George Hsieh,et al. Design for a secure interoperable cloud-based Personal Health Record service , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[21] Fei Liu,et al. Public-Key Encryption with Keyword Search from Lattice , 2013, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[22] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[23] Erkay Savas,et al. Efficient and secure ranked multi-keyword search on encrypted cloud data , 2012, EDBT-ICDT '12.
[24] Chris Peikert,et al. Generating Shorter Bases for Hard Random Lattices , 2009, Theory of Computing Systems.