Pages that link to "Item:Q3596399"
From MaRDI portal
The following pages link to Conjunctive, Subset, and Range Queries on Encrypted Data (Q3596399):
Displaying 50 items.
- Self-updatable encryption with short public parameters and its extensions (Q264135) (← links)
- Effective error-tolerant keyword search for secure cloud computing (Q458133) (← links)
- Secure deduplication storage systems supporting keyword search (Q494049) (← links)
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle (Q497143) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- Computational friendly attribute-based encryptions with short ciphertext (Q512647) (← links)
- Generic construction of designated tester public-key encryption with keyword search (Q713419) (← links)
- Proxy re-encryption with keyword search (Q985079) (← links)
- Using abelian varieties to improve pairing-based cryptography (Q1027984) (← links)
- Impossibility of simulation secure functional encryption even with random oracles (Q1629443) (← links)
- A survey on design and implementation of protected searchable data in the cloud (Q1686146) (← links)
- Adaptively simulation-secure attribute-hiding predicate encryption (Q1710619) (← links)
- Improved inner-product encryption with adaptive security and full attribute-hiding (Q1710620) (← links)
- Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems (Q1733051) (← links)
- Minimizing locality of one-way functions via semi-private randomized encodings (Q1747656) (← links)
- Identity-based encryption with outsourced equality test in cloud computing (Q1750514) (← links)
- Robust encryption (Q1753165) (← links)
- Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis (Q1787193) (← links)
- Relations between semantic security and anonymity in identity-based encryption (Q1944921) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- Non-interactive anonymous router (Q2056804) (← links)
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption (Q2057139) (← links)
- Simpler constructions of asymmetric primitives from obfuscation (Q2152062) (← links)
- Decentralized policy-hiding ABE with receiver privacy (Q2167764) (← links)
- Dynamic collusion bounded functional encryption from identity-based encryption (Q2170069) (← links)
- Predicate encryption from bilinear maps and one-sided probabilistic rank (Q2175910) (← links)
- Attribute based encryption for deterministic finite automata from DLIN (Q2175933) (← links)
- Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation (Q2194864) (← links)
- Expressive query over outsourced encrypted data (Q2198021) (← links)
- Multidimensional segment trees can do range updates in poly-logarithmic time (Q2220857) (← links)
- Functional broadcast encryption with applications to data sharing for cloud storage (Q2224865) (← links)
- Public key encryption with filtered equality test revisited (Q2232126) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)
- A multi-authority approach to various predicate encryption types (Q2291666) (← links)
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing (Q2292920) (← links)
- Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms (Q2293030) (← links)
- Predicate encryption supporting disjunctions, polynomial equations, and inner products (Q2377068) (← links)
- Research on quantum authentication methods for the secure access control among three elements of cloud computing (Q2400196) (← links)
- Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption (Q2402372) (← links)
- Efficient revocable identity-based encryption via subset difference methods (Q2402970) (← links)
- A query privacy-enhanced and secure search scheme over encrypted data in cloud computing (Q2403229) (← links)
- Efficient request-based comparable encryption scheme based on sliding window method (Q2403279) (← links)
- On the power of rewinding simulators in functional encryption (Q2407055) (← links)
- Anonymous and leakage resilient IBE and IPE (Q2407713) (← links)
- Reconciling non-malleability with homomorphic encryption (Q2408582) (← links)
- Inner-product encryption under standard assumptions (Q2430410) (← links)
- Improved hidden vector encryption with short ciphertexts and tokens (Q2430414) (← links)
- Finding composite order ordinary elliptic curves using the Cocks-Pinch method (Q2430983) (← links)
- The relation and transformation between hierarchical inner product encryption and spatial encryption (Q2448081) (← links)
- Public-key authenticated encryption with keyword search revisited: security model and constructions (Q2660908) (← links)