-
1
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. of INFOCOM. IEEE, 2010, pp. 1-9.
-
(2010)
Proc. of INFOCOM. IEEE
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
2
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attributebased encryption
-
M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attributebased encryption," IEEE TPDS, vol. 24, no. 1, pp. 131-143, 2013.
-
(2013)
IEEE TPDS
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
4
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. of S&P. IEEE, 2000, pp. 44-55.
-
(2000)
Proc. of S&P. IEEE
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
5
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Y. Huang, D. Evans, J. Katz, and L. Malka, "Faster secure two-party computation using garbled circuits." in USENIX Security Symposium, vol. 201, no. 1, 2011.
-
(2011)
USENIX Security Symposium
, vol.201
, Issue.1
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
7
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in Proc. of CCS. ACM, 2006, pp. 79-88.
-
(2006)
Proc. of CCS. ACM
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
8
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
S. Kamara, C. Papamanthou, and T. Roeder, "Dynamic searchable symmetric encryption," in Proc. of CCS. ACM, 2012, pp. 965-976.
-
(2012)
Proc. of CCS. ACM
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
9
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. of INFOCOM. IEEE, 2011, pp. 829-837.
-
(2011)
Proc. of INFOCOM. IEEE
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
10
-
-
84877939257
-
Privacypreserving multi-keyword text search in the cloud supporting similaritybased ranking
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, "Privacypreserving multi-keyword text search in the cloud supporting similaritybased ranking," in Proc. of ASIACCS. ACM, 2013, pp. 71-82.
-
(2013)
Proc. of ASIACCS. ACM
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
11
-
-
41549164259
-
Private query on encrypted data in multi-user settings
-
Springer
-
F. Bao, R. H. Deng, X. Ding, and Y. Yang, "Private query on encrypted data in multi-user settings," in Information Security Practice and Experience. Springer, 2008, pp. 71-85.
-
(2008)
Information Security Practice and Experience
, pp. 71-85
-
-
Bao, F.1
Deng, R.H.2
Ding, X.3
Yang, Y.4
-
12
-
-
84863181194
-
Multi-user private keyword search for cloud computing
-
Y. Yang, H. Lu, and J. Weng, "Multi-user private keyword search for cloud computing," in Proc. of CloudCom. IEEE, 2011, pp. 264-271.
-
(2011)
Proc. of CloudCom. IEEE
, pp. 264-271
-
-
Yang, Y.1
Lu, H.2
Weng, J.3
-
13
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Springer
-
Y. H. Hwang and P. J. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," in Proc. of Pairing. Springer, 2007, pp. 2-22.
-
(2007)
Proc. of Pairing
, pp. 2-22
-
-
Hwang, Y.H.1
Lee, P.J.2
-
14
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Springer
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," in Proc. of EUROCRYPT. Springer, 1998, pp. 127-144.
-
(1998)
Proc. of EUROCRYPT
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
15
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable secure file sharing on untrusted storage," in Proc. of FAST, vol. 42, 2003, pp. 29-42.
-
(2003)
Proc. of FAST
, vol.42
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
16
-
-
35048901123
-
Public key encryption with keyword search
-
Springer
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Proc. of Eurocrypt. Springer, 2004, pp. 506-522.
-
(2004)
Proc. of Eurocrypt
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
17
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
Springer
-
P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. of ACNS. Springer, 2004, pp. 31-45.
-
(2004)
Proc. of ACNS
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
18
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Springer
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Theory of cryptography. Springer, 2007, pp. 535-554.
-
(2007)
Theory of Cryptography
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
19
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Springer
-
J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," in Proc. of EUROCRYPT. Springer, 2008, pp. 146-162.
-
(2008)
Proc. of EUROCRYPT
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
20
-
-
80051880293
-
Authorized private keyword search over encrypted data in cloud computing
-
M. Li, S. Yu, N. Cao, and W. Lou, "Authorized private keyword search over encrypted data in cloud computing," in Proc. of ICDCS. IEEE, 2011, pp. 383-392.
-
(2011)
Proc. of ICDCS. IEEE
, pp. 383-392
-
-
Li, M.1
Yu, S.2
Cao, N.3
Lou, W.4
-
21
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. of CCS. ACM, 2006, pp. 89-98.
-
(2006)
Proc. of CCS. ACM
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
22
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. of S&P. IEEE, 2007, pp. 321-334.
-
(2007)
Proc. of S&P. IEEE
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
23
-
-
45749116552
-
Provably secure ciphertext policy abe
-
L. Cheung and C. Newport, "Provably secure ciphertext policy abe," in Proc. of CCS. ACM, 2007, pp. 456-465.
-
(2007)
Proc. of CCS. ACM
, pp. 456-465
-
-
Cheung, L.1
Newport, C.2
-
24
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in Proc. of ASIACCS. ACM, 2010, pp. 261-270.
-
(2010)
Proc. of ASIACCS. ACM
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
25
-
-
70350649061
-
Predicate privacy in encryption systems
-
Springer
-
E. Shen, E. Shi, and B. Waters, "Predicate privacy in encryption systems," in Theory of Cryptography. Springer, 2009, pp. 457-473.
-
(2009)
Theory of Cryptography
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
26
-
-
0032201622
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private information retrieval," Journal of the ACM, vol. 45, no. 6, pp. 965-981, 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
28
-
-
84904442547
-
-
Pairing-based cryptography libray
-
"Pairing-based cryptography libray." [Online]. Available: http://crypto.stanford.edu/pbc/
-
-
-
-
29
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Springer
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Proc. of CRYPTO. Springer, 2001, pp. 213-229.
-
(2001)
Proc. of CRYPTO
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
|