A survey of provably secure searchable encryption

C Bösch, P Hartel, W Jonker, A Peter - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …

Object cosegmentation

S Vicente, C Rother, V Kolmogorov - CVPR 2011, 2011 - ieeexplore.ieee.org
Cosegmentation is typically defined as the task of jointly segmenting “something similar” in a
given set of images. Existing methods are too generic and so far have not demonstrated …

Identity-based encryption with outsourced equality test in cloud computing

S Ma - Information Sciences, 2016 - Elsevier
We firstly combine the concepts of public key encryption with equality test (PKEET) and
identity-based encryption (IBE) to obtain identity-based encryption with equality test (IBEET) …

Efficient public key encryption with equality test supporting flexible authorization

S Ma, Q Huang, M Zhang… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
We reformalize and recast the notion of public key encryption with equality test (PKEET),
which was proposed in CT-RSA 2010 and supports to check whether two ciphertexts …

Privacy-preserving cloud-based road condition monitoring with source authentication in VANETs

Y Wang, Y Ding, Q Wu, Y Wei, B Qin… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The connected vehicular ad hoc network (VANET) and cloud computing technology allows
entities in VANET to enjoy the advantageous storage and computing services offered by …

Heterogeneous signcryption with equality test for IIoT environment

H Xiong, Y Zhao, Y Hou, X Huang, C Jin… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The existing signcryption schemes with equality testing are aimed at a sole cryptosystem
and not suitable for the sophisticated heterogeneous network of Industrial Internet of Things …

BL-MLE: Block-level message-locked encryption for secure large file deduplication

R Chen, Y Mu, G Yang, F Guo - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Deduplication is a popular technique widely used to save storage spaces in the cloud. To
achieve secure deduplication of encrypted files, Bellare et al. formalized a new …

Efficient and secure identity-based encryption scheme with equality test in cloud computing

L Wu, Y Zhang, KKR Choo, D He - Future Generation Computer Systems, 2017 - Elsevier
Efficient searching on encrypted data outsourced to the cloud remains a research challenge.
Identity-based encryption with equality test (IBEET) scheme has recently been identified as a …

Public key encryption supporting plaintext equality test and user‐specified authorization

Q Tang - Security and Communication Networks, 2012 - Wiley Online Library
In this paper, we investigate a category of public key encryption schemes that supports
plaintext equality test and user‐specified authorization. With this new primitive, two users …

Message-locked encryption for lock-dependent messages

M Abadi, D Boneh, I Mironov, A Raghunathan… - Advances in Cryptology …, 2013 - Springer
Motivated by the problem of avoiding duplication in storage systems, Bellare, Keelveedhi,
and Ristenpart have recently put forward the notion of Message-Locked Encryption (MLE) …