A survey of provably secure searchable encryption
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …
and comprehensive overview of the two main SE techniques: searchable symmetric …
Object cosegmentation
Cosegmentation is typically defined as the task of jointly segmenting “something similar” in a
given set of images. Existing methods are too generic and so far have not demonstrated …
given set of images. Existing methods are too generic and so far have not demonstrated …
Identity-based encryption with outsourced equality test in cloud computing
S Ma - Information Sciences, 2016 - Elsevier
We firstly combine the concepts of public key encryption with equality test (PKEET) and
identity-based encryption (IBE) to obtain identity-based encryption with equality test (IBEET) …
identity-based encryption (IBE) to obtain identity-based encryption with equality test (IBEET) …
Efficient public key encryption with equality test supporting flexible authorization
We reformalize and recast the notion of public key encryption with equality test (PKEET),
which was proposed in CT-RSA 2010 and supports to check whether two ciphertexts …
which was proposed in CT-RSA 2010 and supports to check whether two ciphertexts …
Privacy-preserving cloud-based road condition monitoring with source authentication in VANETs
Y Wang, Y Ding, Q Wu, Y Wei, B Qin… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The connected vehicular ad hoc network (VANET) and cloud computing technology allows
entities in VANET to enjoy the advantageous storage and computing services offered by …
entities in VANET to enjoy the advantageous storage and computing services offered by …
Heterogeneous signcryption with equality test for IIoT environment
The existing signcryption schemes with equality testing are aimed at a sole cryptosystem
and not suitable for the sophisticated heterogeneous network of Industrial Internet of Things …
and not suitable for the sophisticated heterogeneous network of Industrial Internet of Things …
BL-MLE: Block-level message-locked encryption for secure large file deduplication
Deduplication is a popular technique widely used to save storage spaces in the cloud. To
achieve secure deduplication of encrypted files, Bellare et al. formalized a new …
achieve secure deduplication of encrypted files, Bellare et al. formalized a new …
Efficient and secure identity-based encryption scheme with equality test in cloud computing
Efficient searching on encrypted data outsourced to the cloud remains a research challenge.
Identity-based encryption with equality test (IBEET) scheme has recently been identified as a …
Identity-based encryption with equality test (IBEET) scheme has recently been identified as a …
Public key encryption supporting plaintext equality test and user‐specified authorization
Q Tang - Security and Communication Networks, 2012 - Wiley Online Library
In this paper, we investigate a category of public key encryption schemes that supports
plaintext equality test and user‐specified authorization. With this new primitive, two users …
plaintext equality test and user‐specified authorization. With this new primitive, two users …
Message-locked encryption for lock-dependent messages
Motivated by the problem of avoiding duplication in storage systems, Bellare, Keelveedhi,
and Ristenpart have recently put forward the notion of Message-Locked Encryption (MLE) …
and Ristenpart have recently put forward the notion of Message-Locked Encryption (MLE) …