Dual trapdoor identity-based encryption with keyword search
From MaRDI portal
Publication:1701741
DOI10.1007/s00500-015-1960-6zbMath1387.94090OpenAlexW2267775562WikidataQ122236734 ScholiaQ122236734MaRDI QIDQ1701741
Jia'nan Liu, Junzuo Lai, Xin-Yi Huang
Publication date: 27 February 2018
Published in: Soft Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00500-015-1960-6
cloud computingdual system encryptionhierarchical identity-based encryptionfuzzy keyword searchidentity-based encryption with keyword search
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (3)
Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC ⋮ Building a dynamic searchable encrypted medical database for multi-client ⋮ Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing
Cites Work
- Unnamed Item
- Unnamed Item
- Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15--17, 2009. Proceedings
- Public key cryptography -- PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18--20, 2009. Proceedings
- Identity-Based Cryptosystems and Signature Schemes
- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Predicate Privacy in Encryption Systems
- Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
- Hierarchical ID-Based Cryptography
- Applied Cryptography and Network Security
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Theory of Cryptography
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
This page was built for publication: Dual trapdoor identity-based encryption with keyword search