-
1
-
-
71549143789
-
Biometric identification over encrypted data made feasible
-
Springer
-
[1] Adjedj, M., Bringer, J., Chabanne, H., Kindarji, B., Biometric identification over encrypted data made feasible. Information Systems Security, 2009, Springer, 86–100.
-
(2009)
Information Systems Security
, pp. 86-100
-
-
Adjedj, M.1
Bringer, J.2
Chabanne, H.3
Kindarji, B.4
-
2
-
-
68849097854
-
Dual-policy attribute based encryption
-
Springer
-
[2] Attrapadung, N., Imai, H., Dual-policy attribute based encryption. Applied Cryptography and Network Security, 2009, Springer, 168–185.
-
(2009)
Applied Cryptography and Network Security
, pp. 168-185
-
-
Attrapadung, N.1
Imai, H.2
-
3
-
-
0003745894
-
-
Israel Institute of Technology Technion, Haifa, Israel Phd thesis
-
[3] Beimel, A., Secure schemes for secret sharing and key distribution, 1996, Israel Institute of Technology, Technion, Haifa, Israel Phd thesis.
-
(1996)
Secure schemes for secret sharing and key distribution
-
-
Beimel, A.1
-
4
-
-
35048901123
-
Public key encryption with keyword search
-
Springer
-
[4] Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G., Public key encryption with keyword search. Proc. of EUROCRYPT’04, 2004, Springer, 506–522.
-
(2004)
Proc. of EUROCRYPT’04
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
5
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Springer-Verlag London, UK, UK
-
[5] Boneh, D., Franklin, M.K., Identity-based encryption from the weil pairing. Proc. of CRYPTO’01, 2001, Springer-Verlag, 213–229 London, UK, UK.
-
(2001)
Proc. of CRYPTO’01
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
6
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Springer
-
[6] Boneh, D., Waters, B., Conjunctive, subset, and range queries on encrypted data. Theory of Cryptography, 2007, Springer, 535–554.
-
(2007)
Theory of Cryptography
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
7
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
ACM New York, NY, USA
-
[7] Goyal, V., Pandey, O., Sahai, A., Waters, B., Attribute-based encryption for fine-grained access control of encrypted data. Proc. of CCS’06, 2006, ACM, New York, NY, USA, 89–98.
-
(2006)
Proc. of CCS’06
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
8
-
-
84899113029
-
Outsourcing the decryption of abe ciphertexts
-
USENIX Association Berkeley, CA, USA 34–34
-
[8] Green, M., Hohenberger, S., Waters, B., Outsourcing the decryption of abe ciphertexts. Proc. of SEC’11, 2011, USENIX Association, Berkeley, CA, USA 34–34.
-
(2011)
Proc. of SEC’11
-
-
Green, M.1
Hohenberger, S.2
Waters, B.3
-
9
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Springer
-
[9] Hwang, Y.H., Lee, P.J., Public key encryption with conjunctive keyword search and its extension to a multi-user system. Proc. of Pairing’07, 2007, Springer, 2–22.
-
(2007)
Proc. of Pairing’07
, pp. 2-22
-
-
Hwang, Y.H.1
Lee, P.J.2
-
10
-
-
84924804821
-
Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage
-
[10] Li, H., Liu, D., Dai, Y., Luan, T.H., Shen, X., Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerging Top. Comput. 3:1 (2015), 127–138.
-
(2015)
IEEE Trans. Emerging Top. Comput.
, vol.3
, Issue.1
, pp. 127-138
-
-
Li, H.1
Liu, D.2
Dai, Y.3
Luan, T.H.4
Shen, X.5
-
11
-
-
84938701752
-
Searchable attribute-based mechanism with efficient data sharing for secure cloud storage
-
[11] Liang, K., Susilo, W., Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 10:9 (2015), 1981–1992.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.9
, pp. 1981-1992
-
-
Liang, K.1
Susilo, W.2
-
12
-
-
84998816223
-
A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains
-
(preprint online)
-
[12] Liu, X., Qin, B., Deng, R.H., Lu, R., Jianfeng, M., A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains. Trans. Comput., 2016 (preprint online).
-
(2016)
Trans. Comput.
-
-
Liu, X.1
Qin, B.2
Deng, R.H.3
Lu, R.4
Jianfeng, M.5
-
14
-
-
84883353658
-
Privacy preserving context aware publish subscribe systems
-
Springer
-
[14] Nabeel, M., Appel, S., Bertino, E., Buchmann, A., Privacy preserving context aware publish subscribe systems. Network and System Security, 2013, Springer, 465–478.
-
(2013)
Network and System Security
, pp. 465-478
-
-
Nabeel, M.1
Appel, S.2
Bertino, E.3
Buchmann, A.4
-
15
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
IEEE
-
[15] Shi, E., Bethencourt, J., Chan, T.-H., Song, D., Perrig, A., Multi-dimensional range query over encrypted data. Proc. of S&P’07, 2007, IEEE, 350–364.
-
(2007)
Proc. of S&P’07
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.-H.3
Song, D.4
Perrig, A.5
-
16
-
-
84906483101
-
Authorized keyword search on encrypted data
-
Springer
-
[16] Shi, J., Lai, J., Li, Y., Deng, R.H., Weng, J., Authorized keyword search on encrypted data. Proc. of ESORICS’14, 2014, Springer, 419–435.
-
(2014)
Proc. of ESORICS’14
, pp. 419-435
-
-
Shi, J.1
Lai, J.2
Li, Y.3
Deng, R.H.4
Weng, J.5
-
17
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
IEEE
-
[17] Song, D.X., Wagner, D., Perrig, A., Practical techniques for searches on encrypted data. Proc. of S&P’00, 2000, IEEE, 44–55.
-
(2000)
Proc. of S&P’00
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
18
-
-
78449236216
-
Public-key encryption with registered keyword search
-
Springer
-
[18] Tang, Q., Chen, L., Public-key encryption with registered keyword search. Proc. of EUROPKI’09, 2009, Springer, 163–178.
-
(2009)
Proc. of EUROPKI’09
, pp. 163-178
-
-
Tang, Q.1
Chen, L.2
-
19
-
-
84891787641
-
Securing broker-less publish/subscribe systems using identity-based encryption
-
[19] Tariq, M.A., Koldehofe, B., Rothermel, K., Securing broker-less publish/subscribe systems using identity-based encryption. IEEE Trans. Parallel Distrib. Syst. 25:2 (2014), 518–528.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.2
, pp. 518-528
-
-
Tariq, M.A.1
Koldehofe, B.2
Rothermel, K.3
-
20
-
-
84894209509
-
A ciphertext-policy attribute-based encryption scheme supporting keyword search function
-
Springer
-
[20] Wang, C., Li, W., Li, Y., Xu, X., A ciphertext-policy attribute-based encryption scheme supporting keyword search function. Cyberspace Safety and Security, 2013, Springer, 377–386.
-
(2013)
Cyberspace Safety and Security
, pp. 377-386
-
-
Wang, C.1
Li, W.2
Li, Y.3
Xu, X.4
-
21
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Springer-Verlag Berlin, Heidelberg
-
[21] Waters, B., Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Proc. of PKC’11, 2011, Springer-Verlag, Berlin, Heidelberg, 53–70.
-
(2011)
Proc. of PKC’11
, pp. 53-70
-
-
Waters, B.1
-
22
-
-
84903121888
-
Expressive, efficient, and revocable data access control for multi-authority cloud storage
-
[22] Yang, K., Jia, X., Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans. Parallel Distrib. Syst. 25:7 (2014), 1735–1744.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.7
, pp. 1735-1744
-
-
Yang, K.1
Jia, X.2
-
23
-
-
84961742903
-
Secure and verifiable policy update outsourcing for big data access control in the cloud
-
[23] Yang, K., Jia, X., Ren, K., Secure and verifiable policy update outsourcing for big data access control in the cloud. IEEE Trans. Parallel Distrib. Syst. 26:12 (2015), 3461–3470.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.12
, pp. 3461-3470
-
-
Yang, K.1
Jia, X.2
Ren, K.3
-
24
-
-
84968761568
-
Time-domain attribute-based access control for cloud-based video content sharing: a cryptographic approach
-
[24] Yang, K., Liu, Z., Jia, X., Shen, X.S., Time-domain attribute-based access control for cloud-based video content sharing: a cryptographic approach. IEEE Trans. on Multimedia 18:5 (2016), 940–950.
-
(2016)
IEEE Trans. on Multimedia
, vol.18
, Issue.5
, pp. 940-950
-
-
Yang, K.1
Liu, Z.2
Jia, X.3
Shen, X.S.4
-
25
-
-
78651101167
-
Towards a cryptographic treatment of publish/subscribe systems
-
Springer
-
[25] Yuen, T.H., Susilo, W., Mu, Y., Towards a cryptographic treatment of publish/subscribe systems. Cryptology and Network Security, 2010, Springer, 201–220.
-
(2010)
Cryptology and Network Security
, pp. 201-220
-
-
Yuen, T.H.1
Susilo, W.2
Mu, Y.3
-
26
-
-
84904410658
-
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
-
IEEE
-
[26] Zheng, Q., Xu, S., Ateniese, G., VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. Proc. of INFOCOM‘14, 2014, IEEE, 522–530.
-
(2014)
Proc. of INFOCOM‘14
, pp. 522-530
-
-
Zheng, Q.1
Xu, S.2
Ateniese, G.3
|