A survey of provably secure searchable encryption

C Bösch, P Hartel, W Jonker, A Peter - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …

Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives

MR Alagheband, A Mashatan - Internet of Things, 2022 - Elsevier
Abstract Internet of Things (IoT) systems in different areas, such as manufacturing,
transportation, and healthcare, are the convergence of several technologies. There are …

Attribute-based encryption with verifiable outsourced decryption

J Lai, RH Deng, C Guan, J Weng - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows
users to encrypt and decrypt data based on user attributes. A promising application of ABE is …

[图书][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

Designated-server identity-based authenticated encryption with keyword search for encrypted emails

H Li, Q Huang, J Shen, G Yang, W Susilo - Information Sciences, 2019 - Elsevier
In encrypted email system, how to search over encrypted cloud emails without decryption is
an important and practical problem. Public key encryption with keyword search (PEKS) is an …

Structure-preserving signatures on equivalence classes and constant-size anonymous credentials

G Fuchsbauer, C Hanser, D Slamanig - Journal of Cryptology, 2019 - Springer
Abstract Structure-preserving signatures (SPS) are a powerful building block for
cryptographic protocols. We introduce SPS on equivalence classes (SPS-EQ), which allow …

Challenges with assessing the impact of NFS advances on the security of pairing-based cryptography

A Menezes, P Sarkar, S Singh - International Conference on Cryptology in …, 2016 - Springer
In the past two years there have been several advances in Number Field Sieve (NFS)
algorithms for computing discrete logarithms in finite fields\mathbb F _ p^ n where p is prime …

Efficient redactable signature and application to anonymous credentials

O Sanders - IACR International Conference on Public-Key …, 2020 - Springer
Let us assume that Alice has received a constant-size signature on a set of messages {m_i\}
_ i= 1^ n from some organization. Depending on the situation, Alice might need to disclose …

Certificateless public key encryption with equality test

H Qu, Z Yan, XJ Lin, Q Zhang, L Sun - Information Sciences, 2018 - Elsevier
In this paper, we present the concept of certificateless public key encryption with equality test
(CL-PKEET), which integrates certificateless public key cryptography (CL-PKC) into public …

Practical round-optimal blind signatures in the standard model

G Fuchsbauer, C Hanser, D Slamanig - Annual Cryptology Conference, 2015 - Springer
Round-optimal blind signatures are notoriously hard to construct in the standard model,
especially in the malicious-signer model, where blindness must hold under adversarially …