Identity-based encryption with outsourced equality test in cloud computing

S Ma - Information Sciences, 2016 - Elsevier
We firstly combine the concepts of public key encryption with equality test (PKEET) and
identity-based encryption (IBE) to obtain identity-based encryption with equality test (IBEET) …

Efficient and expressive keyword search over encrypted data in cloud

H Cui, Z Wan, RH Deng, G Wang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Searchable encryption allows a cloud server to conduct keyword search over encrypted data
on behalf of the data users without learning the underlying plaintexts. However, most …

Patient-controlled attribute-based encryption for secure electronic health records system

J Eom, DH Lee, K Lee - Journal of medical systems, 2016 - Springer
In recent years, many countries have been trying to integrate electronic health data
managed by each hospital to offer more efficient healthcare services. Since health data …

Public key encryption with authorized keyword search

P Jiang, Y Mu, F Guo, Q Wen - … 2016, Melbourne, VIC, Australia, July 4-6 …, 2016 - Springer
Public key encryption with keyword search (PEKS) provides an elegant mechanism for a
user to identify the specific encrypted data. PEKS protects data against disclosure while …

Online/offline ciphertext retrieval on resource constrained devices

P Jiang, Y Mu, F Guo, X Wang, Q Wen - The Computer Journal, 2016 - academic.oup.com
The ciphertext retrieval is of paramount importance for data confidentiality and utilization in
mobile cloud environment. The receiver, usually equipped with resource constrained …

Hybrid publicly verifiable computation

J Alderman, C Janson, C Cid, J Crampton - … CA, USA, February 29-March 4 …, 2016 - Springer
Abstract Publicly Verifiable Outsourced Computation (PVC) allows weak devices to delegate
computations to more powerful servers, and to verify the correctness of results. Delegation …

ABKS‐CSC: attribute‐based keyword search with constant‐size ciphertexts

Y Yang, J Han, W Susilo, TH Yuen… - Security and …, 2016 - Wiley Online Library
Attribute‐based keyword search (ABKS) was proposed to enable a third party to search
encrypted keywords without compromising the security of the original data. Because it can …

Oblivious keyword search with authorization

P Jiang, X Wang, J Lai, F Guo, R Chen - Provable Security: 10th …, 2016 - Springer
Oblivious keyword search (OKS) allows a user to search and retrieve the data associated
with a chosen keyword in an oblivious way. The database supplier issues a trapdoor (used …

Centralized keyword search on encrypted data for cloud applications

P Jiang, Y Mu, F Guo, X Wang… - Security and …, 2016 - Wiley Online Library
Centralized approaches are widely adopted to improve the qualities of outsourced services
owing to its feature of efficient system management. Because the cloud is untrusted, data are …

[PDF][PDF] On the use of attribute-based encryption in publicly verifiable outsourced computation.

J Alderman - 2016 - pure.royalholloway.ac.uk
Publicly verifiable outsourced computation (PVC) allows devices with restricted resources to
delegate computations to external servers, and to verify the correctness of results. Servers …