Privacy-preserving multi-keyword searchable encryption for distributed systems

X Liu, G Yang, W Susilo, J Tonien… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
As cloud storage has been widely adopted in various applications, how to protect data
privacy while allowing efficient data search and retrieval in a distributed environment …

Identity-based encryption with filtered equality test for smart city applications

Y Ming, E Wang - Sensors, 2019 - mdpi.com
With the growth of the urban population, the rapid development of smart cities has become
the focus of urban regional development. Smart medical care is an indispensable part of …

Public-key encryption with tester verifiable equality test for cloud computing

Z Zhao, W Susilo, B Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Public-key encryption with equality test (PKEET) provides cloud servers with an effective
way to check the equality of outsourced encrypted data without decryption. This enables …

Time-controlled hierarchical multikeyword search over encrypted data in cloud-assisted IoT

T Liu, Y Miao, KKR Choo, H Li, X Liu… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices and systems are becoming increasingly commonplace, and
as such systems scale up, so do the computational and storage requirements. Hence, one …

Efficient equality test on identity-based ciphertexts supporting flexible authorization

N Li - Entropy, 2023 - mdpi.com
In the cloud, uploading encrypted data is the most effective way to ensure that the data are
not leaked. However, data access control is still an open problem in cloud storage systems …

[HTML][HTML] Public key encryption with equality test via hash proof system

M Zeng, J Chen, K Zhang, H Qian - Theoretical Computer Science, 2019 - Elsevier
Public key encryption with equality test (PKEET) allows a tester to know whether ciphertexts
are the encryptions of a same message or not by using the trapdoors issued from their …

A new searchable encryption scheme with integrity preservation property

M Zamani, M Safkhani, N Daneshpour… - Wireless Personal …, 2021 - Springer
Searchable encryption schemes allow documents' owners to store their encrypted
documents on servers, search for the desired keyword and then download only the desired …

An efficient queries processing model based on multi broadcast searchable keywords encryption (mbske)

BA Al-Maytami, P Fan, AJ Hussain, T Baker, P Liatsis - Ad hoc networks, 2020 - Elsevier
Cloud computing is a technology which has enabled many organizations to outsource their
data in an encrypted form to improve processing times. The public Internet was not initially …

Pairing-free for public key encryption with equality test scheme

H Zhu, L Wang, H Ahmad, D Xie - IEEE Access, 2021 - ieeexplore.ieee.org
The modular exponentiation has been proved better in terms of computational efficiency as
compared to bilinear pairing. Therefore, discrete logarithm, a concept of modular …

Set-ot: A secure equality testing protocol based on oblivious transfer

F Karakoç, M Nateghizad, Z Erkin - Proceedings of the 14th International …, 2019 - dl.acm.org
We propose a new secure equality testing (SET) protocol, namely SET-OT, for two-party
setting by using a recently introduced Private Set Membership Protocol (PSM) based on …