References
- S. Ma, Q. Huang, M. Zhang, and B. Yang, "Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization," IEEE Trans. on Information Forensics and Security, vol. 10, no. 3, pp.458-470, 2015. https://doi.org/10.1109/TIFS.2014.2378592
- Shor PW. "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM review, vol. 41, no. 2, 303-332, 1999. https://doi.org/10.1137/S0036144598347011
- S. Baba, S. Kotyad and R. Teja, "A non-Abelian factorization problem and an associated cryptosystem[J]," IACR Cryptology ePrint Archive, 2011.
- M. Bellare, A. Boldyreva and A. ONeill, "Deterministic and efficiently searchable encryption,"Annual International Cryptology Conference. Springer Berlin Heidelberg, pp. 535-552, 2007.
- M. Bellare, M. Fischlin, A. ONeill, and T. Ristenpart, "Deterministic encryption: Definitional equivalences and constructions without random oracles," in Proc. of Advances in Cryptology (Lecture Notes in Computer Science), vol. 5157. Berlin, Germany: Springer-Verlag, pp. 360-378, Aug. 2008.
- A. Boldyreva, S. Fehr, and A. ONeill, "On notions of security for deterministic encryption, and efficient constructions without random oracles," in Proc. of Annual International Cryptology Conference. Springer Berlin Heidelberg, 335-359, 2008.
- D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Proc. of International Conference on the Theory and Applications of Cryptographic Techniques. Springer Berlin Heidelberg, 506-522, 2004.
- N. Cao, C. Wang, M. Li, K. Ren and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst, vol. 25, no. 1, 222C233, 2014. https://doi.org/10.1109/TPDS.2013.45
- L. Fang, W. Susilo, C. Ge et al. "Public key encryption with keyword search secure against keyword guessing attacks without random oracle," Information Sciences, vol. 238, 221-241, 2013. https://doi.org/10.1016/j.ins.2013.03.008
- M. Abdalla, M. Bellare, D. Catalano, et al. "Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions," Advances in CryptologyCCRYPTO 2005. Springer Berlin Heidelberg, 2005, 205-222.
- J. W. Byun, H. S. HRhee, H. A. Park, et al. "Off-line keyword guessing attacks on recent keyword search schemes over encrypted data," Secure Data Management. Springer Berlin Heidelberg, 2006, 75-83.
- P. Xu, H. Jin, Q. Wu, et al. "Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack," IEEE Transactions on computers, vol. 62, no. 11, 2266-2277, 2013. https://doi.org/10.1109/TC.2012.215
- Y. Yu, J. Ni, H. Yang, et al. "Efficient public key encryption with revocable keyword search,"Security and Communication Networks, vol. 7, no. 2, 466-472, 2014. https://doi.org/10.1002/sec.790
- M. Nishioka, "Perfect keyword privacy in PEKS systems," Provable Security. Springer Berlin Heidelberg, 175-192, 2012.
- G. Yang, C. H. Tan, Q. Huang, et al. "Probabilistic public key encryption with equality test," in Proc. of Cryptographers Track at the RSA Conference. Springer Berlin Heidelberg, 119-131, 2010.
- Q. Tang, "Towards public key encryption scheme supporting equality test with fine-grained authorization," in Proc. of Australasian Conference on Information Security and Privacy. Springer Berlin Heidelberg, 389-406, 2011.
- Q. Tang, "Public key encryption supporting plaintext equality test and user-specified authorization," Security and Communication Networks, vol. 5, no. 12, 1351-1362, 2012. https://doi.org/10.1002/sec.418
- Q. Tang, "Public key encryption schemes supporting equality test with authorization of different granularity," International journal of applied cryptography, vol. 2, no. 4, 304-321, 2012. https://doi.org/10.1504/IJACT.2012.048079
- S. Ma, M. Zhang, Q. Huang, et al. "Public key encryption with delegated equality test in a multi-user setting," The Computer Journal, bxu026, 2014.
- A. G. Myasnikov, V. Shpilrain and A. Ushakov, "Non-commutative Cryptography and Complexity of Group-theoretic Problems," Providence, RI, USA: American Mathematical Society, 2011.
- N. R. Wagner, M. R. Magyarik. "A public-key cryptosystem based on the word problem," in Proc. of Workshop on the Theory and Application of Cryptographic Techniques. Springer Berlin Heidelberg, 1984, 19-36, 1984.
- K. H. Ko, S. J. Lee, J. H. Cheon, J. W.Han, J. Kang and C. Park. "New public-key cryptosystem using braid groups," CRYPTO 2000, LNCS 1880, pp. 166-183. Springer, 2000.
- V. Shpilrain and A. Ushakov. "Thompson's group and public key cryptography," ACNS 2005, LNCS 3531, pp. 151-164. Springer, 2005.
- V. Shpilrain, G. Zapata. "Combinatorial group theory and public key cryptography," Applicable Algebra in Engineering, Communication and Computing, vol. 17, no. 3-4, 291-302, 2006. https://doi.org/10.1007/s00200-006-0006-9
- S. Ma, "Identity-based encryption with outsourced equality test in cloud computing," Information Sciences, 328, 389-402, 2016. https://doi.org/10.1016/j.ins.2015.08.053
- L. Gu, L. Wang, K. Ota, M. Dong, Z. Cao, Y. Yang. "New public key cryptosystems based on non-abelian factorization problems," Security and Communication Networks, vol. 6, no. 7, pp. 912-922, 2013. https://doi.org/10.1002/sec.710
- D. Kahrobaei, C. Koupparis, V. Shpilrain. "Public key exchange using matrices over group rings," Groups-Complexity-Cryptology, 5(1), 2013.
- X. Chen, J. Li, X. Huang, J. Ma, and W. Lou, "New Publicly Verifiable Databases with Efficient Updates," IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 5, 546-556, 2015. https://doi.org/10.1109/TDSC.2014.2366471
- S. Benabbas, R. Gennaro, and Y. Vahlis, "Verifiable delegation of computation over large datasets," Advances in Cryptology-CRYPTO 2011, LNCS 6841, Springer, pp.111-131, 2011.
- X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, "New algorithms for secure outsourcing of modular exponentiations," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 9, 2386-2396, 2014. https://doi.org/10.1109/TPDS.2013.180
- Shor PW. "Algorithms for quantum computation: discrete logarithms and factoring," in Proc. of FOCS 1994. IEEE Computer Society: Washington, D.C., 124-134, 1994.