Mobile access and flexible search over encrypted cloud data in heterogeneous systems
From MaRDI portal
Publication:1998999
Recommendations
- A secure cloud data sharing scheme from identity-based proxy re-encryption
- A dynamic type and identity-based proxy re-encryption scheme
- Identity-based encryption with outsourced equality test in cloud computing
- Flexible attribute-based proxy re-encryption for efficient data sharing
- A query privacy-enhanced and secure search scheme over encrypted data in cloud computing
Cites work
- scientific article; zbMATH DE number 1303118 (Why is no real title available?)
- scientific article; zbMATH DE number 1024079 (Why is no real title available?)
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Advances in Cryptology - EUROCRYPT 2004
- CCA proxy re-encryption without bilinear maps in the standard model
- CCA-Secure Proxy Re-encryption without Pairings
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Identity-based encryption with outsourced equality test in cloud computing
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Probabilistic public key encryption with equality test
- Progress in Cryptology - INDOCRYPT 2003
- Public Key Cryptography - PKC 2005
- Scheduling Precedence Constrained Stochastic Tasks on Heterogeneous Cluster Systems
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Tracing Malicious Proxies in Proxy Re-encryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
Cited in
(4)- EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
- A secure cloud data sharing scheme from identity-based proxy re-encryption
- Efficient and fully secure lattice-based IBE with equality test
- Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
This page was built for publication: Mobile access and flexible search over encrypted cloud data in heterogeneous systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1998999)