Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing |
Elhabob, Rashad
(School of Information and Software Engineering, University of Electronic Science and Technology of China)
Zhao, Yanan (School of Information and Software Engineering, University of Electronic Science and Technology of China) Sella, Iva (School of Information and Software Engineering, University of Electronic Science and Technology of China) Xiong, Hu (School of Information and Software Engineering, University of Electronic Science and Technology of China) |
1 | N. Fernando, S. W. Loke, W. Rahayu, "Mobile cloud computing: A survey," Future generation computer systems, 29 (1), 84-106, 2013. DOI |
2 | A. Botta, W. De Donato, V. Persico, A. Pescape, "Integration of cloud computing and internet of things: a survey," Future Generation Computer Systems, 56, 684-700, 2016. DOI |
3 | Q. Yan, F. R. Yu, Q. Gong, J. Li, "Software-defined networking (sdn) and distributed denial of service (ddos) attacks in cloud computing environments: A survey some research issues, and challenges," IEEE Communications Surveys & Tutorials, 18(1), 602-622, 2016. DOI |
4 | H. Takabi, J. B. Joshi, G.-J. Ahn, "Security and privacy challenges in cloud computing environments," IEEE Security & Privacy, 8(6), 24-31, 2010. DOI |
5 | H. Hong, Z. Sun, "Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for iot," World Wide Web, 21(3), 595-607, 2018. DOI |
6 | H. Hong, Z. Sun, "Achieving secure data access control and efficient key updating in mobile multimedia sensor networks," Multimedia Tools and Applications, 77(4), 4477-4490, 2018. DOI |
7 | H. Hong, Z. Sun, "A key-insulated ciphertext policy attribute based signcryption for mobile networks," Wireless Personal Communications, 95(2), 1215-1228, 2017. DOI |
8 | H. Hong, X. Liu, Z. Sun, "A fine-grained attribute based data retrieval with proxy re-encryption scheme for data outsourcing systems," Mobile Networks and Applications, 1-6, 2018. |
9 | G. Yang, C. H. Tan, Q. Huang, D. S. Wong, "Probabilistic public key encryption with equality test," in Proc. of Cryptographers Track at the RSA Conference, Springer, pp. 119-131, 2010. |
10 | D. Boneh, G. Di Crescenzo, R. Ostrovsky, G. Persiano, "Public key encryption with keyword search," in Proc. of International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp. 506-522, 2004. |
11 | S. Ma, Q. Huang, M. Zhang, B. Yang, "Efficient public key encryption with equality test supporting flexible authorization," IEEE Transactions on Information Forensics and Security, 10(3), 458-470, 2015. DOI |
12 | Q. Tang, "Public key encryption supporting plaintext equality test and user-specified authorization," Security and Communication Networks, 5(12), 1351-1362, 2012. DOI |
13 | S. Ma, M. Zhang, Q. Huang, B. Yang, "Public key encryption with delegated equality test in a multi-user setting," The Computer Journal, 58(4), 986-1002, 2014. DOI |
14 | K. Huang, R. Tso, Y.-C. Chen, S. M. M. Rahman, A. Almogren, A. Alamri, "Pke-aet: public key encryption with authorized equality test," The Computer Journal, 58(10), 2686-2697, 2015. DOI |
15 | Y. Xu, M. Wang, H. Zhong, J. Cui, L. Liu, V. N. Franqueira, "Verifiable public key encryption scheme with equality test in 5g networks," IEEE Access 5, 12702-12713, 2017. DOI |
16 | S. Ma, "Identity-based encryption with outsourced equality test in cloud computing," Information Sciences, 328, 389-402, 2016. DOI |
17 | H. T. Lee, S. Ling, J. H. Seo, H. Wang, "Semi-generic construction of public key encryption and identity-based encryption with equality test," Information Sciences, 373, 419-440, 2016. DOI |
18 | L. Wu, Y. Zhang, K.-K. R. Choo, D. He, "Efficient and secure identity-based encryption scheme with equality test in cloud computing," Future Generation Computer Systems, 73, 22-31, 2017. DOI |
19 | S. S. Al-Riyami, K. G. Paterson, "Certificateless public key cryptography," Asiacrypt, Springer, Vol. 2894, pp. 452-473, 2003. |
20 | L. Wu, Y. Zhang, K.-K. R. Choo, D. He, "Efficient identity-based encryption scheme with equality test in smart city," IEEE Transactions on Sustainable Computing, 3(1), 44-55, 2018. DOI |
21 | H. Qu, Z. Yan, X.-J. Lin, Q. Zhang, L. Sun, "Certificateless public key encryption with equality test," Information Sciences, 462, 76-92, 2018. DOI |
22 | M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, H. Shi, "Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions," Crypto, Springer, 2(3), 350-391, 2008. |
23 | Q. Tang, "Towards public key encryption scheme supporting equality test with fine-grained authorization," in Proc. of Australasian Conference on Information Security and Privacy, Springer, pp. 389-406, 2011. |
24 | Q. Tang, "Public key encryption schemes supporting equality test with authorization of different granularity," International journal of applied cryptography, 2(4), 304-321, 2012. DOI |
25 | D. Boneh, M. Franklin, "Identity-based encryption from the weil pairing," in Proc. of Annual International Cryptology Conference, Springer, pp. 213-229, 2001. |
26 | B. Lynn et al., "The pairing-based cryptography library," 2006. [Online]. Available: crypto.stanford.edu/pbc/[Mar. 27, 2013] |