Privacy-preserving and pairing-free multirecipient certificateless encryption with keyword search for cloud-assisted IIoT
Y Lu, J Li, Y Zhang - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Nowadays, cloud-assisted Industrial Internet of Things (IIoT) has become pervasive in
modern enterprises, because it supplies a promising way to transform the operation mode of …
modern enterprises, because it supplies a promising way to transform the operation mode of …
Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks
Y Lu, J Li, Y Zhang - IEEE Transactions on Services Computing, 2019 - ieeexplore.ieee.org
Searchable public key encryption (SPKE) is a useful public key cryptographic primitive that
allows a user to perform keyword searches over publicly encrypted messages on an …
allows a user to perform keyword searches over publicly encrypted messages on an …
Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement
Y Lu, G Wang, J Li - Information Sciences, 2019 - Elsevier
Public key encryption with keyword search (PEKS) is a useful paradigm that enables a user
to delegate searching capabilities on publicly encrypted data to an untrusted third party …
to delegate searching capabilities on publicly encrypted data to an untrusted third party …
Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage
L Guo, WC Yau - Journal of medical systems, 2015 - Springer
Searchable encryption is an important cryptographic primitive that enables privacy-
preserving keyword search on encrypted electronic medical records (EMRs) in cloud …
preserving keyword search on encrypted electronic medical records (EMRs) in cloud …
A hybrid scheme for fine-grained search and access authorization in fog computing environment
M Xiao, J Zhou, X Liu, M Jiang - Sensors, 2017 - mdpi.com
In the fog computing environment, the encrypted sensitive data may be transferred to
multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to …
multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to …
Provably secure public-key encryption with conjunctive and subset keyword search
O Farràs, J Ribes-González - International Journal of Information Security, 2019 - Springer
Public-key encryption with keyword search (PEKS) schemes enable public key holders to
encrypt documents, while the secret key holder is able to generate queries for the encrypted …
encrypt documents, while the secret key holder is able to generate queries for the encrypted …
A keyword-searchable ABE scheme from lattice in cloud storage environment
L Liu, S Wang, B He, D Zhang - Ieee Access, 2019 - ieeexplore.ieee.org
Currently, the security situation of data security and user privacy protection is increasingly
serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy …
serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy …
Efficient attribute-based access control with authorized search in cloud storage
Attribute-based encryption has been widely employed to achieve data confidentiality and
fine-grained access control in cloud storage. To enable users to identify accessible data in …
fine-grained access control in cloud storage. To enable users to identify accessible data in …
StopGuess: A framework for public-key authenticated encryption with keyword search
Public key encryption with keyword search (PEKS) allows users to search on encrypted data
without leaking the keyword information from the ciphertexts. But it does not preserve …
without leaking the keyword information from the ciphertexts. But it does not preserve …
A generic construction of integrated secure-channel free PEKS and PKE and its application to EMRs in cloud storage
T Suzuki, K Emura, T Ohigashi - Journal of medical systems, 2019 - Springer
To provide a search functionality for encrypted data, public key encryption with keyword
search (PEKS) has been widely recognized. In actual usage, a PEKS scheme should be …
search (PEKS) has been widely recognized. In actual usage, a PEKS scheme should be …