-
2
-
-
54249101916
-
Public key encryption with keyword search revisited[M]
-
GERVASI O MURGANTE B LAGAN A. et al.. Berlin: Springer Berlin /Heidel-berg
-
BAEK J, SAFAVI-NAINI R, SUSILO W. Public Key Encryption with Keyword Search Revisited[M]//GERVASI O, MURGANTE B, LAGAN A, et al. Computational Science and Its Applications ICCSA 2008. Lecture Notes in Computer Science, vol. 5072. Berlin: Springer Berlin /Heidel-berg. 2008: 1249-1259.
-
(2008)
Computational Science and Its Applications ICCSA 2008. Lecture Notes in Computer Science
, vol.5072
, pp. 1249-1259
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
3
-
-
77649179760
-
Trapdoor security in a searchable public-key encryption scheme with a designated tester[J]
-
RHEE H S, PARK J H, SUSILO W, et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester[J]. Journal of Systems and Software, 2010, 83 (5): 763-771.
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.5
, pp. 763-771
-
-
Rhee, H.S.1
Park, J.H.2
Susilo, W.3
-
4
-
-
84861580700
-
Generic construction of designated tester public-key encryption with keyword search[J]
-
RHEE H S, PARK J H, LEE D H. Generic construction of designated tester public-key encryption with keyword search[J]. Information Sciences, 2012, 205 (0): 93-109.
-
(2012)
Information Sciences
, vol.205
, Issue.0
, pp. 93-109
-
-
Rhee, H.S.1
Park, J.H.2
Lee, D.H.3
-
5
-
-
84884892085
-
Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack[J]
-
XU Peng, JIN Hai, WU Qianhong, et al. Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack[J]. Computers, IEEE Transactions on, 2012, 62 (11): 2266-2277.
-
(2012)
Computers IEEE Transactions on
, vol.62
, Issue.11
, pp. 2266-2277
-
-
Peng, X.U.1
Hai, J.2
Qianhong, W.U.3
-
7
-
-
53449097686
-
A survey of certificateless encryption schemes and security models[J]
-
DENT A. A survey of certificateless encryption schemes and security models[J]. International Journal of Information Security, 2008, 7 (5): 349-377.
-
(2008)
International Journal of Information Security
, vol.7
, Issue.5
, pp. 349-377
-
-
Dent, A.1
-
9
-
-
44549086712
-
A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography[J]
-
WANG Fengjiao, ZHANG Yuqing. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography[J]. Computer Communications, 2008, 31 (10): 2142-2149.
-
(2008)
Computer Communications
, vol.31
, Issue.10
, pp. 2142-2149
-
-
Wang, F.1
Zhang, Y.2
-
10
-
-
74049117962
-
Certificateless onion routing[C]
-
Chicago, Illinois, USA: ACM
-
CATALANO D, FIORE D, GENNARO R. Certificateless onion routing[C]//Proceedings of the 16th ACM conference on Computer and communications security. Chicago, Illinois, USA: ACM. 2009: 151-160.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 151-160
-
-
Catalano, D.1
Fiore, D.2
Gennaro, R.3
-
11
-
-
80053998094
-
Provably-secure electronic cash based on certificateless partially-blind signatures[J]
-
ZHANG Lei, ZHANG Futai, QIN Bo, et al. Provably-secure electronic cash based on certificateless partially-blind signatures[J]. Electronic Commerce Research and Applications, 2011, 10 (5): 545-552.
-
(2011)
Electronic Commerce Research and Applications
, vol.10
, Issue.5
, pp. 545-552
-
-
Lei, Z.1
Futai, Z.2
Bo, Q.3
-
12
-
-
84959540048
-
An efficient certificateless encryption for secure data sharing in public clouds[J]
-
SEO S, NABEEL M, DING Xiaoyu, et al. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds[J]. Knowledge and Data Engineering, IEEE Transactions on, 2013, 26 (9): 2107-2119
-
(2013)
Knowledge and Data Engineering IEEE Transactions on
, vol.26
, Issue.9
, pp. 2107-2119
-
-
Seo, S.1
Nabeel, M.2
Xiaoyu, D.3
-
14
-
-
35048901123
-
Public key encryption with keyword search[M]
-
CACHIN C CAMENISCH J. Berlin: Springer Berlin /Heidelberg
-
BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public Key Encryption with Keyword Search[M]//CACHIN C, CAMENISCH J. Advances in Cryptology-EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027. Berlin: Springer Berlin /Heidelberg. 2004: 506-522.
-
(2004)
Advances in Cryptology-EUROCRYPT 2004. Lecture Notes in Computer Science
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.I.2
Ostrovsky, R.3
-
15
-
-
33750696320
-
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[M]
-
JONKER W PETKOVI M.. Berlin: Springer Berlin Heidelberg
-
BYUN J, RHEE H, PARK H A, et al. Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data[M]//JONKER W, PETKOVI M. Secure Data Management. Lecture Notes in Computer Science, vol. 4165. Berlin: Springer Berlin Heidelberg. 2006: 75-83.
-
(2006)
Secure Data Management. Lecture Notes in Computer Science
, vol.4165
, pp. 75-83
-
-
Byun, J.1
Rhee, H.2
Park, H.A.3
-
18
-
-
84890057288
-
Certificateless proxy identity-based signcryption scheme without bilinear pairings[J]
-
QI Yanfeng, TANG Chunming, LOU Yu et al. Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings[J]. China Communications, 2013, 10 (11): 37-41.
-
(2013)
China Communications
, vol.10
, Issue.11
, pp. 37-41
-
-
Qi, Y.1
Tang, C.2
Lou, Y.3
|