A survey of provably secure searchable encryption
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …
and comprehensive overview of the two main SE techniques: searchable symmetric …
Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives
MR Alagheband, A Mashatan - Internet of Things, 2022 - Elsevier
Abstract Internet of Things (IoT) systems in different areas, such as manufacturing,
transportation, and healthcare, are the convergence of several technologies. There are …
transportation, and healthcare, are the convergence of several technologies. There are …
Attribute-based encryption with verifiable outsourced decryption
Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows
users to encrypt and decrypt data based on user attributes. A promising application of ABE is …
users to encrypt and decrypt data based on user attributes. A promising application of ABE is …
[图书][B] Handbook of finite fields
GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …
book for the theory and applications of finite fields. It is not intended to be an introductory …
Designated-server identity-based authenticated encryption with keyword search for encrypted emails
In encrypted email system, how to search over encrypted cloud emails without decryption is
an important and practical problem. Public key encryption with keyword search (PEKS) is an …
an important and practical problem. Public key encryption with keyword search (PEKS) is an …
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
Abstract Structure-preserving signatures (SPS) are a powerful building block for
cryptographic protocols. We introduce SPS on equivalence classes (SPS-EQ), which allow …
cryptographic protocols. We introduce SPS on equivalence classes (SPS-EQ), which allow …
Challenges with assessing the impact of NFS advances on the security of pairing-based cryptography
In the past two years there have been several advances in Number Field Sieve (NFS)
algorithms for computing discrete logarithms in finite fields\mathbb F _ p^ n where p is prime …
algorithms for computing discrete logarithms in finite fields\mathbb F _ p^ n where p is prime …
Efficient redactable signature and application to anonymous credentials
O Sanders - IACR International Conference on Public-Key …, 2020 - Springer
Let us assume that Alice has received a constant-size signature on a set of messages {m_i\}
_ i= 1^ n from some organization. Depending on the situation, Alice might need to disclose …
_ i= 1^ n from some organization. Depending on the situation, Alice might need to disclose …
Certificateless public key encryption with equality test
H Qu, Z Yan, XJ Lin, Q Zhang, L Sun - Information Sciences, 2018 - Elsevier
In this paper, we present the concept of certificateless public key encryption with equality test
(CL-PKEET), which integrates certificateless public key cryptography (CL-PKC) into public …
(CL-PKEET), which integrates certificateless public key cryptography (CL-PKC) into public …
Practical round-optimal blind signatures in the standard model
Round-optimal blind signatures are notoriously hard to construct in the standard model,
especially in the malicious-signer model, where blindness must hold under adversarially …
especially in the malicious-signer model, where blindness must hold under adversarially …