A survey of provably secure searchable encryption

C Bösch, P Hartel, W Jonker, A Peter - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …

Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing

Y Jiang, W Susilo, Y Mu, F Guo - Future Generation Computer Systems, 2018 - Elsevier
Abstract In Fog Computing, fragile connection between Fog and Cloud causes problems of
the authentication and authorization. Recently, Stojmenovic, Wen, Huang and Luan …

Multi-user keyword search scheme for secure data sharing with fine-grained access control

F Zhao, T Nishide, K Sakurai - … Security and Cryptology-ICISC 2011: 14th …, 2012 - Springer
We consider the problem of searchable encryption scheme for the cryptographic cloud
storage in such a way that it can be efficiently and privately executed under the multi-user …

Searching keywords with wildcards on encrypted data

S Sedghi, P Van Liesdonk, S Nikova, P Hartel… - … and Cryptography for …, 2010 - Springer
A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where
the public key is actually a vector over a certain alphabet. The decryption key is also derived …

Dynamic attribute-based signcryption without random oracles

K Emura, A Miyaji, MS Rahman - International Journal of …, 2012 - inderscienceonline.com
In SCN2010, Gagné, Narayan, and Safavi-Naini proposed attribute-based signcryption
(ABSC) with threshold structure. As in ciphertext-policy attribute-based encryption (CP-ABE) …

Achieving privacy-preserving sensitive attributes for large universe based on private set intersection

L Yang, C Li, Y Cheng, S Yu, J Ma - Information Sciences, 2022 - Elsevier
Nowadays, an increasing amount of data has been sent to the cloud for analysis and
storage, and data security in the cloud has been widely concerned. Among them, CP-ABE is …

Hiding the policy in cryptographic access control

S Müller, S Katzenbeisser - … , STM 2011, Copenhagen, Denmark, June 27 …, 2012 - Springer
Recently, cryptographic access control has received a lot of attention, mainly due to the
availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows to get rid of a …

Ciphertext-policy attribute-based encryption with key-delegation abuse resistance

Y Jiang, W Susilo, Y Mu, F Guo - … 2016, Melbourne, VIC, Australia, July 4-6 …, 2016 - Springer
Attribute-based encryption (ABE) is a promising cryptographic primitive that allows one-to-
many encryption. In such a system, users' private keys are linked to their access rights. We …

Realizing IoT service's policy privacy over publish/subscribe-based middleware

L Duan, Y Zhang, S Chen, S Wang, B Cheng, J Chen - SpringerPlus, 2016 - Springer
The publish/subscribe paradigm makes IoT service collaborations more scalable and
flexible, due to the space, time and control decoupling of event producers and consumers …

A new DRM architecture with strong enforcement

S Müller, S Katzenbeisser - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
We propose a new DRM architecture that utilizes a two-step enforcement process to enable
strong security even in the case of a compromised DRM viewer. This is achieved by using …