Identity-based encryption with outsourced equality test in cloud computing
From MaRDI portal
Publication:1750514
DOI10.1016/j.ins.2015.08.053zbMath1390.68278OpenAlexW1442181477WikidataQ120903038 ScholiaQ120903038MaRDI QIDQ1750514
Publication date: 22 May 2018
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2015.08.053
Related Items (21)
A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model ⋮ Lattice-based IBE with equality test supporting flexible authorization in the standard model ⋮ Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption ⋮ Public key encryption with equality test in the standard model ⋮ Secure server-aided data sharing clique with attestation ⋮ Efficient and fully secure lattice-based IBE with equality test ⋮ Security analysis of public key encryption with filtered equality test ⋮ More efficient adaptively secure lattice-based IBE with equality test in the standard model ⋮ Generic construction of public key encryption, identity-based encryption and signcryption with equality test ⋮ A fully secure lattice-based signcryption with designated equality test in standard model ⋮ Certificateless public key encryption with equality test ⋮ Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis ⋮ Public key encryption with fuzzy matching ⋮ Public key encryption with filtered equality test revisited ⋮ Identity-based encryption with equality test and datestamp-based authorization mechanism ⋮ Mobile access and flexible search over encrypted cloud data in heterogeneous systems ⋮ Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks ⋮ Cryptography-based secure data storage and sharing using HEVC and public clouds ⋮ Semi-generic construction of public key encryption and identity-based encryption with equality test ⋮ CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications ⋮ An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
Cites Work
- Unnamed Item
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Public key encryption schemes supporting equality test with authorisation of different granularity
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
- Anonymous HIBE: Compact Construction Over Prime-Order Groups
- Public-Key Encryption with Delegated Search
- Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization
- A New General Framework for Secure Public Key Encryption with Keyword Search
- Decryptable Searchable Encryption
- Delegating Capabilities in Predicate Encryption Systems
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
- Probabilistic Public Key Encryption with Equality Test
- Perfect Keyword Privacy in PEKS Systems
- Authorized Keyword Search on Encrypted Data
- Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
- Advances in Cryptology - EUROCRYPT 2004
- Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
This page was built for publication: Identity-based encryption with outsourced equality test in cloud computing