-
2
-
-
77950347409
-
A view of cloud computing
-
[2] Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M., A view of cloud computing. Commun. ACM 53:4 (2010), 50–58.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
3
-
-
79951999348
-
Study on cloud computing security
-
(in Chinese with English abstract)
-
[3] Feng, D., Zhang, M., Zhang, Y., Xu, Z., Study on cloud computing security. Ruan Jian Xue Bao/J. Softw. 22:1 (2011), 71–83, 10.3724/SP.J.1001.2011.03958 (in Chinese with English abstract) http://www.jos.org.cn/1000-9825/3958.htm.
-
(2011)
Ruan Jian Xue Bao/J. Softw.
, vol.22
, Issue.1
, pp. 71-83
-
-
Feng, D.1
Zhang, M.2
Zhang, Y.3
Xu, Z.4
-
4
-
-
77956137294
-
Cryptographic cloud storage
-
Springer Berlin, Heidelberg
-
[4] Kamara, S., Lauter, K., Cryptographic cloud storage. Financial Cryptography and Data Security, 2010, Springer, Berlin, Heidelberg, 136–149.
-
(2010)
Financial Cryptography and Data Security
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
5
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
[5] Takabi, H., Joshi, J.B.D., Ahn, G.J., Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8:6 (2010), 24–31.
-
(2010)
IEEE Secur. Priv.
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.J.3
-
6
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
[6] Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A., Security and privacy for storage and computation in cloud computing. Inform. Sci. 258 (2014), 371–386.
-
(2014)
Inform. Sci.
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Jia, W.5
Chen, Y.6
Vasilakos, A.7
-
7
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
Springer Berlin, Heidelberg
-
[7] Abdalla, M., Bellare, M., Catalano, D., Kiltz, M., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H., Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Advances in Cryptology, CRYPTO 2005, 2005, Springer, Berlin, Heidelberg, 205–222.
-
(2005)
Advances in Cryptology, CRYPTO 2005
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, M.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
8
-
-
0032201622
-
Private information retrieval
-
[8] Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M., Private information retrieval. J. ACM 45:6 (1998), 965–981.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
9
-
-
38049138213
-
Public key encryption that allows PIR queries
-
Springer Berlin, Heidelberg
-
[9] Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith, W.E. III, Public key encryption that allows PIR queries. Advances in Cryptology, CRYPTO 2007, 2007, Springer, Berlin, Heidelberg, 50–67.
-
(2007)
Advances in Cryptology, CRYPTO 2007
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
Skeith, W.E.4
-
10
-
-
1942420748
-
Oblivious keyword search
-
[10] Ogata, W., Kurosawa, K., Oblivious keyword search. J. Complexity 20:2 (2004), 356–371.
-
(2004)
J. Complexity
, vol.20
, Issue.2
, pp. 356-371
-
-
Ogata, W.1
Kurosawa, K.2
-
11
-
-
70350649061
-
Predicate privacy in encryption systems
-
Springer Berlin, Heidelberg
-
[11] Shen, E., Shi, E., Waters, B., Predicate privacy in encryption systems. Theory of Cryptography, 2009, Springer, Berlin, Heidelberg, 457–473.
-
(2009)
Theory of Cryptography
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
12
-
-
85206022267
-
-
[12] C. Bösch, P. Hartel, W. Jonker, A. Peter, A survey of provably secure searchable encryption, ACM Comput. Surv. 47(2) 1–18.
-
A survey of provably secure searchable encryption, ACM Comput. Surv.
-
-
Bösch, C.1
Hartel, P.2
Jonker, W.3
Peter, A.4
-
13
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
[13] Gentry, C., Computing arbitrary functions of encrypted data. Commun. ACM 53:3 (2010), 97–105.
-
(2010)
Commun. ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
14
-
-
85017491929
-
Access pattern disclosure on searchable encryption: Ramification, attack and mitigation,
-
[14] M.S. Islam, M. Kuzu, M. Kantarcioglu, Access pattern disclosure on searchable encryption: Ramification, attack and mitigation, in: NDSS. 2012, vol. 20, pp. 1–12.
-
NDSS. 2012, vol. 20, pp. 1–12.
-
-
Islam, M.S.1
Kuzu, M.2
Kantarcioglu, M.3
-
15
-
-
84893808472
-
Search pattern leakage in searchable encryption: Attacks and new construction
-
[15] Liu, C., Zhu, L., Wang, M., Tan, Y.A., Search pattern leakage in searchable encryption: Attacks and new construction. Inform. Sci. 265 (2014), 176–188.
-
(2014)
Inform. Sci.
, vol.265
, pp. 176-188
-
-
Liu, C.1
Zhu, L.2
Wang, M.3
Tan, Y.A.4
-
16
-
-
0003691180
-
Foundations of Cryptography: Volume 2, Basic Applications
-
Cambridge University Press
-
[16] Goldreich, O., Foundations of Cryptography: Volume 2, Basic Applications. 2009, Cambridge University Press.
-
(2009)
-
-
Goldreich, O.1
-
17
-
-
54249101916
-
Public key encryption with keyword search revisited
-
Springer Berlin, Heidelberg
-
[17] Baek, J., Safavi-Naini, R., Susilo, W., Public key encryption with keyword search revisited. Computational Science and Its Applications, ICCSA 2008, 2008, Springer, Berlin, Heidelberg, 1249–1259.
-
(2008)
Computational Science and Its Applications, ICCSA 2008
, pp. 1249-1259
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
18
-
-
35048901123
-
Public key encryption with keyword search
-
Springer Berlin, Heidelberg
-
[18] Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G., Public key encryption with keyword search. Advances in Cryptology, Eurocrypt 2004, 2004, Springer, Berlin, Heidelberg, 506–522.
-
(2004)
Advances in Cryptology, Eurocrypt 2004
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
19
-
-
71549153479
-
A secure channel free public key encryption with keyword search scheme without random oracle
-
Springer Berlin, Heidelberg
-
[19] Fang, L., Susilo, W., Ge, C., Wang, J., A secure channel free public key encryption with keyword search scheme without random oracle. Cryptology and Network Security, 2009, Springer, Berlin, Heidelberg, 248–258.
-
(2009)
Cryptology and Network Security
, pp. 248-258
-
-
Fang, L.1
Susilo, W.2
Ge, C.3
Wang, J.4
-
20
-
-
84876842378
-
Public key encryption with keyword search secure against keyword guessing attacks without random oracle
-
[20] Fang, L., Susilo, W., Ge, C., Wang, J., Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inform. Sci. 238 (2013), 221–241.
-
(2013)
Inform. Sci.
, vol.238
, pp. 221-241
-
-
Fang, L.1
Susilo, W.2
Ge, C.3
Wang, J.4
-
21
-
-
77649179760
-
Trapdoor security in a searchable public-key encryption scheme with a designated tester
-
[21] Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H., Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83:5 (2010), 763–771.
-
(2010)
J. Syst. Softw.
, vol.83
, Issue.5
, pp. 763-771
-
-
Rhee, H.S.1
Park, J.H.2
Susilo, W.3
Lee, D.H.4
-
22
-
-
71549160150
-
Improved searchable public key encryption with designated tester
-
ACM
-
[22] Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H., Improved searchable public key encryption with designated tester. Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, 2009, ACM, 376–379.
-
(2009)
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
, pp. 376-379
-
-
Rhee, H.S.1
Park, J.H.2
Susilo, W.3
Lee, D.H.4
-
23
-
-
80052365107
-
A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension
-
Springer Berlin, Heidelberg
-
[23] Hu, C., Liu, P., A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension. Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011, Springer, Berlin, Heidelberg, 131–136.
-
(2011)
Advances in Computer Science, Environment, Ecoinformatics, and Education
, pp. 131-136
-
-
Hu, C.1
Liu, P.2
-
24
-
-
84884892085
-
Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack
-
[24] Xu, P., Jin, H., Wu, Q., Wang, W., Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Trans. Comput. 62:11 (2012), 2266–2277.
-
(2012)
IEEE Trans. Comput.
, vol.62
, Issue.11
, pp. 2266-2277
-
-
Xu, P.1
Jin, H.2
Wu, Q.3
Wang, W.4
-
25
-
-
84893869941
-
A function private attribute-based encryption
-
[25] Han, F., Qin, J., A function private attribute-based encryption. Int. J. Distrib. Sens. Netw. 2014 (2014), 1–5.
-
(2014)
Int. J. Distrib. Sens. Netw.
, vol.2014
, pp. 1-5
-
-
Han, F.1
Qin, J.2
-
26
-
-
84884473483
-
Function-private identity-based encryption: Hiding the function in functional encryption,
-
[26] D. Boneh, A. Raghunathan, G. Segev, Function-private identity-based encryption: Hiding the function in functional encryption, in: Advances in Cryptology, CRYPTO, 2013, vol. 13, pp. 461–478.
-
(2013)
Advances in Cryptology, CRYPTO
-
-
Boneh, D.1
Raghunathan, A.2
Segev, G.3
-
27
-
-
84893134547
-
Efficient public key encryption with revocable keyword search
-
[27] Yu, Y., Ni, J., Yang, H., Mu, Y., Susilo, W., Efficient public key encryption with revocable keyword search. Secur. Commun. Netw. 7:2 (2013), 466–472.
-
(2013)
Secur. Commun. Netw.
, vol.7
, Issue.2
, pp. 466-472
-
-
Yu, Y.1
Ni, J.2
Yang, H.3
Mu, Y.4
Susilo, W.5
-
28
-
-
34547240272
-
Searchable symmetric encryption: improved definitions and efficient constructions
-
ACM
-
[28] Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R., Searchable symmetric encryption: improved definitions and efficient constructions. Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006, ACM, 79–88.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
29
-
-
80051880293
-
Authorized private keyword search over encrypted data in cloud computing
-
IEEE
-
[29] Li, M., Yu, S., Cao, N., Lou, W., Authorized private keyword search over encrypted data in cloud computing. 31st International Conference on Distributed Computing Systems, ICDCS, 2011, IEEE, 383–392.
-
(2011)
31st International Conference on Distributed Computing Systems, ICDCS
, pp. 383-392
-
-
Li, M.1
Yu, S.2
Cao, N.3
Lou, W.4
-
30
-
-
84863181194
-
Multi-user private keyword search for cloud computing
-
IEEE
-
[30] Yang, Y., Lu, H., Weng, J., Multi-user private keyword search for cloud computing. IEEE Third International Conference on Cloud Computing Technology and Science, CloudCom, 2011, IEEE, 264–271.
-
(2011)
IEEE Third International Conference on Cloud Computing Technology and Science, CloudCom
, pp. 264-271
-
-
Yang, Y.1
Lu, H.2
Weng, J.3
-
31
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
IEEE
-
[31] Song, D.X., Wagner, D., Perrig, A., Practical techniques for searches on encrypted data. IEEE Symposium on Security and Privacy. S&P 2000. Proceedings, 2000, IEEE, 44–55.
-
(2000)
IEEE Symposium on Security and Privacy. S&P 2000. Proceedings
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
32
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Springer Berlin, Heidelberg
-
[32] Chang, Y.C., Mitzenmacher, M., Privacy preserving keyword searches on remote encrypted data. Applied Cryptography and Network Security, 2005, Springer, Berlin, Heidelberg, 442–455.
-
(2005)
Applied Cryptography and Network Security
, pp. 442-455
-
-
Chang, Y.C.1
Mitzenmacher, M.2
-
34
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
Springer Berlin, Heidelberg
-
[34] Golle, P., Staddon, J., Waters, B., Secure conjunctive keyword search over encrypted data. Applied Cryptography and Network Security, 2004, Springer, Berlin, Heidelberg, 31–45.
-
(2004)
Applied Cryptography and Network Security
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
35
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
IEEE
-
[35] Cao, N., Wang, C., Li, M., Ren, K., Lou, W., Privacy-preserving multi-keyword ranked search over encrypted cloud data. INFOCOM, 2011 Proceedings IEEE, 2011, IEEE, 829–837.
-
(2011)
INFOCOM, 2011 Proceedings IEEE
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
36
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
IEEE
-
[36] Wang, C., Cao, N., Li, J., Ren, K., Lou, W., Secure ranked keyword search over encrypted cloud data. 2010 IEEE 30th International Conference on Distributed Computing Systems, ICDCS, 2010, IEEE, 253–262.
-
(2010)
2010 IEEE 30th International Conference on Distributed Computing Systems, ICDCS
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
37
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
[37] Wang, C., Cao, N., Ren, K., Lou, W., Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23:8 (2012), 1467–1479.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
38
-
-
84908108453
-
Verifiable Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
[38] Sun, W., Cao, N., Li, M., Lou, W., Hou, Y.T., Li, H., Verifiable Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25:11 (2014), 3025–3035.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.11
, pp. 3025-3035
-
-
Sun, W.1
Cao, N.2
Li, M.3
Lou, W.4
Hou, Y.T.5
Li, H.6
-
39
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
ACM
-
[39] Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y.T., Li, H., Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, 2013, ACM, 71–82.
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
40
-
-
84949627772
-
Parallel search over encrypted data under attribute based encryption on the cloud computing
-
[40] Bouabana-Tebibel, T., Kaci, A., Parallel search over encrypted data under attribute based encryption on the cloud computing. Comput. Secur., 2015, 10.1016/j.cose.2015.04.007.
-
(2015)
Comput. Secur.
-
-
Bouabana-Tebibel, T.1
Kaci, A.2
-
42
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Springer Berlin, Heidelberg
-
[42] Boneh, D., Waters, B., Conjunctive, subset, and range queries on encrypted data. Theory of Cryptography, 2007, Springer, Berlin, Heidelberg, 535–554.
-
(2007)
Theory of Cryptography
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
43
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
IEEE
-
[43] Shi, E., Bethencourt, J., Chan, T.H., Song, D., Perrig, A., Multi-dimensional range query over encrypted data. IEEE Symposium on Security and Privacy, SP’07, 2007, IEEE, 350–364.
-
(2007)
IEEE Symposium on Security and Privacy, SP’07
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.H.3
Song, D.4
Perrig, A.5
-
44
-
-
80052002672
-
Order-preserving encryption revisited: Improved security analysis and alternative solutions
-
Springer Berlin, Heidelberg
-
[44] Boldyreva, A., Chenette, N., O'Neill, A., Order-preserving encryption revisited: Improved security analysis and alternative solutions. Advances in Cryptology, CRYPTO 2011, 2011, Springer, Berlin, Heidelberg, 578–595.
-
(2011)
Advances in Cryptology, CRYPTO 2011
, pp. 578-595
-
-
Boldyreva, A.1
Chenette, N.2
O'Neill, A.3
-
45
-
-
84864234736
-
Efficient similarity search over encrypted data
-
IEEE
-
[45] Kuzu, M., Islam, M.S., Kantarcioglu, M., Efficient similarity search over encrypted data. IEEE 28th International Conference on Data Engineering, ICDE, 2012, IEEE, 1156–1167.
-
(2012)
IEEE 28th International Conference on Data Engineering, ICDE
, pp. 1156-1167
-
-
Kuzu, M.1
Islam, M.S.2
Kantarcioglu, M.3
-
46
-
-
70449490810
-
Error-tolerant searchable encryption
-
IEEE
-
[46] Bringer, J., Chabanne, H., Kindarji, B., Error-tolerant searchable encryption. IEEE International Conference on Communications, ICC’09, 2009, IEEE, 1–6.
-
(2009)
IEEE International Conference on Communications, ICC’09
, pp. 1-6
-
-
Bringer, J.1
Chabanne, H.2
Kindarji, B.3
-
47
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
IEEE
-
[47] Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W., Fuzzy keyword search over encrypted data in cloud computing. INFOCOM, 2010 Proceedings IEEE, 2010, IEEE, 1–5.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
48
-
-
84878119000
-
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing
-
[48] Wang, J., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S., Chen, X., Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10:2 (2013), 667–684.
-
(2013)
Comput. Sci. Inf. Syst.
, vol.10
, Issue.2
, pp. 667-684
-
-
Wang, J.1
Ma, H.2
Tang, Q.3
Li, J.4
Zhu, H.5
Ma, S.6
Chen, X.7
-
49
-
-
84904421834
-
Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud
-
IEEE
-
[49] Wang, B., Yu, S., Lou, W., Hou, Y.T., Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. INFOCOM, 2014 Proceedings IEEE, 2014, IEEE, 2112–2120.
-
(2014)
INFOCOM, 2014 Proceedings IEEE
, pp. 2112-2120
-
-
Wang, B.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
-
50
-
-
78649836731
-
Computationally efficient searchable symmetric encryption
-
Springer Berlin, Heidelberg
-
[50] Van Liesdonk, P., Sedghi, S., Doumen, J., Hartel, P., Jonker, W., Computationally efficient searchable symmetric encryption. Secure Data Management, 2010, Springer, Berlin, Heidelberg, 87–100.
-
(2010)
Secure Data Management
, pp. 87-100
-
-
Van Liesdonk, P.1
Sedghi, S.2
Doumen, J.3
Hartel, P.4
Jonker, W.5
-
51
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
ACM
-
[51] Kamara, S., Papamanthou, C., Roeder, T., Dynamic searchable symmetric encryption. Proceedings of the 2012 ACM Conference on Computer and Communications Security, 2012, ACM, 965–976.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
52
-
-
84883285558
-
Parallel and dynamic searchable symmetric encryption
-
Springer Berlin, Heidelberg
-
[52] Kamara, S., Papamanthou, C., Parallel and dynamic searchable symmetric encryption. Financial Cryptography and Data Security, 2013, Springer, Berlin, Heidelberg, 258–274.
-
(2013)
Financial Cryptography and Data Security
, pp. 258-274
-
-
Kamara, S.1
Papamanthou, C.2
-
54
-
-
84871978542
-
Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers
-
IEEE
-
[54] Chai, Q., Gong, G., Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. 2012 IEEE International Conference on Communications, ICC, 2012, IEEE, 917–922.
-
(2012)
2012 IEEE International Conference on Communications, ICC
, pp. 917-922
-
-
Chai, Q.1
Gong, G.2
-
55
-
-
84865817216
-
UC-secure searchable symmetric encryption
-
Springer Berlin, Heidelberg
-
[55] Kurosawa, K., Ohtaki, Y., UC-secure searchable symmetric encryption. Financial Cryptography and Data Security, 2012, Springer, Berlin, Heidelberg, 285–298.
-
(2012)
Financial Cryptography and Data Security
, pp. 285-298
-
-
Kurosawa, K.1
Ohtaki, Y.2
-
56
-
-
0020277962
-
Multidimensional B-trees for associative searching in database systems
-
[56] Scheuermann, P., Ouksel, M., Multidimensional B-trees for associative searching in database systems. Inform. Syst. 7:2 (1982), 123–137.
-
(1982)
Inform. Syst.
, vol.7
, Issue.2
, pp. 123-137
-
-
Scheuermann, P.1
Ouksel, M.2
-
57
-
-
70350407157
-
Privacy-aware attribute-based encryption with user accountability
-
Springer Berlin, Heidelberg
-
[57] Li, J., Ren, K., Zhu, B., Wan, Z., Privacy-aware attribute-based encryption with user accountability. Information Security, 2009, Springer, Berlin, Heidelberg, 347–362.
-
(2009)
Information Security
, pp. 347-362
-
-
Li, J.1
Ren, K.2
Zhu, B.3
Wan, Z.4
-
58
-
-
33744903955
-
Oblivious conjunctive keyword search
-
Springer Berlin, Heidelberg
-
[58] Rhee, H.S., Byun, J.W., Lee, D.H., Lim, J., Oblivious conjunctive keyword search. Information Security Applications, 2006, Springer, Berlin, Heidelberg, 318–327.
-
(2006)
Information Security Applications
, pp. 318-327
-
-
Rhee, H.S.1
Byun, J.W.2
Lee, D.H.3
Lim, J.4
-
59
-
-
84958846385
-
Oblivious fuzzy keyword search based on blind GDH signature
-
[59] Han, F., Qin, J., Oblivious fuzzy keyword search based on blind GDH signature. Comput. Sci. Appl. 3 (2013), 127–133.
-
(2013)
Comput. Sci. Appl.
, vol.3
, pp. 127-133
-
-
Han, F.1
Qin, J.2
-
60
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
ACM
-
[60] Naor, M., Pinkas, B., Oblivious transfer and polynomial evaluation. Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, 1999, ACM, 245–254.
-
(1999)
Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
61
-
-
33750199090
-
Oblivious polynomial evaluation
-
[61] Naor, M., Pinkas, B., Oblivious polynomial evaluation. SIAM J. Comput. 35:5 (2006), 1254–1281.
-
(2006)
SIAM J. Comput.
, vol.35
, Issue.5
, pp. 1254-1281
-
-
Naor, M.1
Pinkas, B.2
-
62
-
-
24144488603
-
Keyword search and oblivious pseudorandom functions
-
Springer Berlin, Heidelberg
-
[62] Freedman, M.J., Ishai, Y., Pinkas, B., Reingold, O., Keyword search and oblivious pseudorandom functions. Theory of Cryptography, 2005, Springer, Berlin, Heidelberg, 303–324.
-
(2005)
Theory of Cryptography
, pp. 303-324
-
-
Freedman, M.J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
63
-
-
78449236216
-
Public-key encryption with registered keyword search
-
Springer Berlin, Heidelberg
-
[63] Tang, Q., Chen, L., Public-key encryption with registered keyword search. Public Key Infrastructures, Services and Applications, 2010, Springer, Berlin, Heidelberg, 163–178.
-
(2010)
Public Key Infrastructures, Services and Applications
, pp. 163-178
-
-
Tang, Q.1
Chen, L.2
-
64
-
-
79959313029
-
Public-key encryption with delegated search
-
Springer Berlin, Heidelberg
-
[64] Ibraimi, L., Nikova, S., Hartel, P., Jonker, W., Public-key encryption with delegated search. Applied Cryptography and Network Security, 2011, Springer, Berlin, Heidelberg, 532–549.
-
(2011)
Applied Cryptography and Network Security
, pp. 532-549
-
-
Ibraimi, L.1
Nikova, S.2
Hartel, P.3
Jonker, W.4
-
65
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Springer Berlin, Heidelberg
-
[65] Blaze, M., Bleumer, G., Strauss, M., Divertible protocols and atomic proxy cryptography. Advances in Cryptology, EUROCRYPT’98, 1998, Springer, Berlin, Heidelberg, 127–144.
-
(1998)
Advances in Cryptology, EUROCRYPT’98
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
66
-
-
77950864045
-
Proxy re-encryption with keyword search
-
[66] Shao, J., Cao, Z., Liang, X., Lin, H., Proxy re-encryption with keyword search. Inform. Sci. 180:13 (2010), 2576–2587.
-
(2010)
Inform. Sci.
, vol.180
, Issue.13
, pp. 2576-2587
-
-
Shao, J.1
Cao, Z.2
Liang, X.3
Lin, H.4
-
67
-
-
50249137692
-
Shared and searchable encrypted data for untrusted servers
-
Springer Berlin, Heidelberg
-
[67] Dong, C., Russello, G., Dulay, N., Shared and searchable encrypted data for untrusted servers. Data and Applications Security XXII, 2008, Springer, Berlin, Heidelberg, 127–143.
-
(2008)
Data and Applications Security XXII
, pp. 127-143
-
-
Dong, C.1
Russello, G.2
Dulay, N.3
-
68
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
Springer Berlin, Heidelberg
-
[68] Bellare, M., Boldyreva, A., O'Neill, A., Deterministic and efficiently searchable encryption. Advances in Cryptology, CRYPTO 2007, 2007, Springer, Berlin, Heidelberg, 535–552.
-
(2007)
Advances in Cryptology, CRYPTO 2007
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
69
-
-
24944554962
-
Fuzzy identity-based encryption
-
Springer Berlin, Heidelberg
-
[69] Sahai, A., Waters, B., Fuzzy identity-based encryption. Advances in Cryptology, EUROCRYPT 2005, 2005, Springer, Berlin, Heidelberg, 457–473.
-
(2005)
Advances in Cryptology, EUROCRYPT 2005
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
70
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
IEEE
-
[70] Bethencourt, J., Sahai, A., Waters, B., Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy, SP’07, 2007, IEEE, 321–334.
-
(2007)
IEEE Symposium on Security and Privacy, SP’07
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
71
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
ACM
-
[71] Goyal, V., Pandey, O., Sahai, A., Waters, B., Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006, ACM, 89–98.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
72
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Springer Berlin, Heidelberg
-
[72] Waters, B., Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Public Key Cryptography, PKC 2011, 2011, Springer, Berlin, Heidelberg, 53–70.
-
(2011)
Public Key Cryptography, PKC 2011
, pp. 53-70
-
-
Waters, B.1
-
73
-
-
84888344018
-
A general transformation from KP-ABE to searchable encryption
-
[73] Han, F., Qin, J., Zhao, H., Hu, J., A general transformation from KP-ABE to searchable encryption. Future Gener. Comput. Syst. 30 (2014), 107–115.
-
(2014)
Future Gener. Comput. Syst.
, vol.30
, pp. 107-115
-
-
Han, F.1
Qin, J.2
Zhao, H.3
Hu, J.4
-
74
-
-
84905743312
-
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control
-
[74] Xhafa, F., Wang, J., Chen, X., Liu, J.K., Li, J., Krause, P., An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput. 18:9 (2014), 1795–1802.
-
(2014)
Soft Comput.
, vol.18
, Issue.9
, pp. 1795-1802
-
-
Xhafa, F.1
Wang, J.2
Chen, X.3
Liu, J.K.4
Li, J.5
Krause, P.6
-
75
-
-
84894047012
-
Sesa: an efficient searchable encryption scheme for auction in emerging smart grid marketing
-
[75] Wen, M., Lu, R., Lei, J., Li, H., Liang, X., Shen, X.S., Sesa: an efficient searchable encryption scheme for auction in emerging smart grid marketing. Secur. Commun. Netw. 7:1 (2014), 234–244.
-
(2014)
Secur. Commun. Netw.
, vol.7
, Issue.1
, pp. 234-244
-
-
Wen, M.1
Lu, R.2
Lei, J.3
Li, H.4
Liang, X.5
Shen, X.S.6
-
76
-
-
84958907985
-
A secure biometric authentication based on PEKS
-
[76] Zhang, Y., Qin, J., Du, L., A secure biometric authentication based on PEKS. Concurr. Comput.: Pract. Exper., 2015, 10.1002/cpe.3539.
-
(2015)
Concurr. Comput.: Pract. Exper.
-
-
Zhang, Y.1
Qin, J.2
Du, L.3
-
77
-
-
80051914330
-
Privacy preserving query over encrypted graph structured data in cloud computing,
-
[77] N. Cao, Z. Yang, C. Wang, K. Ren, W. Lou, Privacy preserving query over encrypted graph structured data in cloud computing, in: ICDCS’11, 2011, pp. 393–402.
-
(2011)
ICDCS’11
, pp. 393-402
-
-
Cao, N.1
Yang, Z.2
Wang, C.3
Ren, K.4
Lou, W.5
|