-
1
-
-
84904444112
-
Protecting your right: Attribute-based keyword search with fine-grained ownerenforced search authorization in the cloud
-
W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, "Protecting your right: Attribute-based keyword search with fine-grained ownerenforced search authorization in the cloud," in Proc. IEEE Conf. Comput. Commun., 2014, pp. 226-234.
-
(2014)
Proc. IEEE Conf. Comput. Commun.
, pp. 226-234
-
-
Sun, W.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
Li, H.5
-
2
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. IEEE Conf. Comput. Commun., 2010, pp. 1-9.
-
(2010)
Proc. IEEE Conf. Comput. Commun.
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
3
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
-
Jan.
-
M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
5
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. IEEE Symp. Security Privacy, 2000, pp. 44-55.
-
(2000)
Proc. IEEE Symp. Security Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
6
-
-
84914127581
-
Faster secure twoparty computation using garbled circuits
-
Y. Huang, D. Evans, J. Katz, and L. Malka, "Faster secure twoparty computation using garbled circuits," in Proc. 20th USENIX Conf. Security Symp., 2011, p. 35.
-
(2011)
Proc. 20th USENIX Conf. Security Symp.
, pp. 35
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
7
-
-
77649261628
-
-
Ph.D. dissertation, Dept. Comput. Sci., Stanford Univ., Stanford, CA, USA
-
C. Gentry, "A fully homomorphic encryption scheme," Ph.D. dissertation, Dept. Comput. Sci., Stanford Univ., Stanford, CA, USA, 2009.
-
(2009)
A Fully Homomorphic Encryption Scheme
-
-
Gentry, C.1
-
8
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 79-88.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
9
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
S. Kamara, C. Papamanthou, and T. Roeder, "Dynamic searchable symmetric encryption," in Proc. ACM Conf. Comput. Commun. Security, 2012, pp. 965-976.
-
(2012)
Proc. ACM Conf. Comput. Commun. Security
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
10
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE Conf. Comput. Commun., 2011, pp. 829-837.
-
(2011)
Proc. IEEE Conf. Comput. Commun.
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
11
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," in Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Security, 2013, pp. 71-82.
-
(2013)
Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Security
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
12
-
-
41549164259
-
Private query on encrypted data in multi-user settings
-
New York, NY, USA: Springer
-
F. Bao, R. H. Deng, X. Ding, and Y. Yang, "Private query on encrypted data in multi-user settings," in Information Security Practice and Experience. New York, NY, USA: Springer, 2008, pp. 71-85.
-
(2008)
Information Security Practice and Experience
, pp. 71-85
-
-
Bao, F.1
Deng, R.H.2
Ding, X.3
Yang, Y.4
-
13
-
-
84863181194
-
Multi-user private keyword search for cloud computing
-
Y. Yang, H. Lu, and J. Weng, "Multi-user private keyword search for cloud computing," in Proc. IEEE 3rd Int. Conf. Cloud Comput. Technol. Sci., 2011, pp. 264-271.
-
(2011)
Proc. IEEE 3rd Int. Conf. Cloud Comput. Technol. Sci.
, pp. 264-271
-
-
Yang, Y.1
Lu, H.2
Weng, J.3
-
14
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Y. H. Hwang, and P. J. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," in Proc. 1st Int. Conf. Pairing, 2007, pp. 2-22.
-
(2007)
Proc. 1st Int. Conf. Pairing
, pp. 2-22
-
-
Hwang, Y.H.1
Lee, P.J.2
-
15
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," in Proc. Int. Conf. Theory Appl. Cryptograph. Techn., 1998, pp. 127-144.
-
(1998)
Proc. Int. Conf. Theory Appl. Cryptograph. Techn.
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
16
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable secure file sharing on untrusted storage," in Proc. 2nd USENIX Conf. File Storage Technol., 2003, vol. 42, pp. 29-42.
-
(2003)
Proc. 2nd USENIX Conf. File Storage Technol.
, vol.42
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
17
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Proc. Int. Conf. Theory Appl. Cryptograph. Techn., 2004, pp. 506-522.
-
(2004)
Proc. Int. Conf. Theory Appl. Cryptograph. Techn.
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
18
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. 2nd Int. Conf. Appl. Cryptography Netw. Security, 2004, pp. 31-45.
-
(2004)
Proc. 2nd Int. Conf. Appl. Cryptography Netw. Security
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
19
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Proc. 4th Conf. Theory Cryptography, 2007, pp. 535-554.
-
(2007)
Proc. 4th Conf. Theory Cryptography
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
20
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," in Proc. 27th Annu. Int. Conf. Adv. Cryptol. Theory Appl. Cryptograph. Techn., 2008, pp. 146-162.
-
(2008)
Proc. 27th Annu. Int. Conf. Adv. Cryptol. Theory Appl. Cryptograph. Techn.
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
21
-
-
80051880293
-
Authorized private keyword search over encrypted data in cloud computing
-
M. Li, S. Yu, N. Cao, and W. Lou, "Authorized private keyword search over encrypted data in cloud computing," in Proc. IEEE 31st Int. Conf. Distrib. Comput. Syst., 2011, pp. 383-392.
-
(2011)
Proc. IEEE 31st Int. Conf. Distrib. Comput. Syst.
, pp. 383-392
-
-
Li, M.1
Yu, S.2
Cao, N.3
Lou, W.4
-
22
-
-
2442590644
-
Authenticating query results in edge computing
-
H. Pang and K.-L. Tan, "Authenticating query results in edge computing," in Proc. 20th Int. Conf. Data Eng., 2004, pp. 560-571.
-
(2004)
Proc. 20th Int. Conf. Data Eng.
, pp. 560-571
-
-
Pang, H.1
Tan, K.-L.2
-
23
-
-
76849102606
-
Authenticating the query results of text search engines
-
H. Pang and K. Mouratidis, "Authenticating the query results of text search engines," Proc. VLDB Endowment, vol. 1, no. 1, pp. 126-137, 2008.
-
(2008)
Proc. VLDB Endowment
, vol.1
, Issue.1
, pp. 126-137
-
-
Pang, H.1
Mouratidis, K.2
-
24
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Aug.
-
C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
25
-
-
84908108453
-
Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
Nov.
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, "Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 11, pp. 3025-3035, Nov. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.11
, pp. 3025-3035
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
26
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
28
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 89-98.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
29
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in Proc. IEEE Symp. Security Privacy, 2007, pp. 321-334.
-
(2007)
Proc. IEEE Symp. Security Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
31
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in Proc. 5th ACM Symp. Inf., Comput. Commun. Security, 2010, pp. 261-270.
-
(2010)
Proc. 5th ACM Symp. Inf., Comput. Commun. Security
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
32
-
-
70350649061
-
Predicate privacy in encryption systems
-
E. Shen, E. Shi, and B. Waters, "Predicate privacy in encryption systems," in Proc. 6th Theory Cryptography Conf., 2009, pp. 457-473.
-
(2009)
Proc. 6th Theory Cryptography Conf.
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
33
-
-
0032201622
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private information retrieval," J. ACM, vol. 45, no. 6, pp. 965-981, 1998.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
|