Public key encryption with fuzzy matching
From MaRDI portal
Publication:2697907
DOI10.1007/978-3-030-90402-9_3OpenAlexW3208367487MaRDI QIDQ2697907
Qiong Huang, Yuanhao Wang, Jianye Huang, Guomin Yang, Meiyan Xiao, Hong-Bo Li
Publication date: 13 April 2023
Full work available at URL: https://doi.org/10.1007/978-3-030-90402-9_3
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Information storage and retrieval of data (68P20) Authentication, digital signatures and secret sharing (94A62) Internet topics (68M11)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Efficient public key encryption with equality test in the standard model
- Identity-based encryption with outsourced equality test in cloud computing
- Public key encryption schemes supporting equality test with authorisation of different granularity
- Certificateless public key encryption with equality test
- Outsourced ciphertext-policy attribute-based encryption with equality test
- ID-based encryption with equality test against insider attack
- Group public key encryption with equality test against offline message recovery attack
- Edit Distance Based Encryption and Its Application
- Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Algorithms on Strings, Trees and Sequences
- Probabilistic Public Key Encryption with Equality Test
- Advances in Cryptology - EUROCRYPT 2004
This page was built for publication: Public key encryption with fuzzy matching