A survey of provably secure searchable encryption

C Bösch, P Hartel, W Jonker, A Peter - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …

Identity-based encryption with outsourced equality test in cloud computing

S Ma - Information Sciences, 2016 - Elsevier
We firstly combine the concepts of public key encryption with equality test (PKEET) and
identity-based encryption (IBE) to obtain identity-based encryption with equality test (IBEET) …

Efficient public key encryption with equality test supporting flexible authorization

S Ma, Q Huang, M Zhang… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
We reformalize and recast the notion of public key encryption with equality test (PKEET),
which was proposed in CT-RSA 2010 and supports to check whether two ciphertexts …

Efficient and secure identity-based encryption scheme with equality test in cloud computing

L Wu, Y Zhang, KKR Choo, D He - Future Generation Computer Systems, 2017 - Elsevier
Efficient searching on encrypted data outsourced to the cloud remains a research challenge.
Identity-based encryption with equality test (IBEET) scheme has recently been identified as a …

Survey on the searchable encryption

李经纬, 贾春福, 刘哲理, 李进, 李敏 - Journal of Software, 2014 - jos.org.cn
从可搜索加密的两类基本问题出发, 回顾了相关研究历史. 介绍了可搜索加密的分类,
包括其应用场景和应用模型, 并探讨了相应的解决策略, 从构造角度, 将其分为对称可搜索加密和 …

[PDF][PDF] 可搜索加密技术研究综述

李经纬, 贾春福, 刘哲理, 李进, 李敏 - 软件学报, 2014 - jos.org.cn
从可搜索加密的两类基本问题出发, 回顾了相关研究历史. 介绍了可搜索加密的分类,
包括其应用场景和应用模型, 并探讨了相应的解决策略, 从构造角度, 将其分为对称可搜索加密和 …

Public key encryption with delegated equality test in a multi-user setting

S Ma, M Zhang, Q Huang, B Yang - The Computer Journal, 2015 - ieeexplore.ieee.org
Probabilistic public key encryption with equality test (PKEET), introduced by Yang et al. in
CT-RSA 2010, is able to check whether two ciphertexts are encryptions of the same …

Key-policy attribute-based encryption with equality test in cloud computing

H Zhu, L Wang, H Ahmad, X Niu - IEEE Access, 2017 - ieeexplore.ieee.org
The privacy of users must be considered as the utmost priority in distributed networks. To
protect the identities of users, attribute-based encryption (ABE) was presented by Sahai et …

PKE-AET: public key encryption with authorized equality test

K Huang, R Tso, YC Chen, SMM Rahman… - The Computer …, 2015 - academic.oup.com
In this paper, we propose a new notion of public key encryption scheme with authorized
equality test (PKE-AET), which allows authorized users those who have warrants to test the …

Secure searches in the cloud: A survey

F Han, J Qin, J Hu - Future Generation Computer Systems, 2016 - Elsevier
Cloud security is a huge concern when users and enterprises consider to deploy cloud
computing services. This article mainly presented an important aspect of cloud security …