Identity-based encryption with outsourced equality test in cloud computing

S Ma - Information Sciences, 2016 - Elsevier
We firstly combine the concepts of public key encryption with equality test (PKEET) and
identity-based encryption (IBE) to obtain identity-based encryption with equality test (IBEET) …

Privacy-preserving and pairing-free multirecipient certificateless encryption with keyword search for cloud-assisted IIoT

Y Lu, J Li, Y Zhang - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Nowadays, cloud-assisted Industrial Internet of Things (IIoT) has become pervasive in
modern enterprises, because it supplies a promising way to transform the operation mode of …

Automatically detecting and describing high level actions within methods

G Sridhara, L Pollock, K Vijay-Shanker - Proceedings of the 33rd …, 2011 - dl.acm.org
One approach to easing program comprehension is to reduce the amount of code that a
developer has to read. Describing the high level abstract algorithmic actions associated with …

Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks

Y Lu, J Li, Y Zhang - IEEE Transactions on Services Computing, 2019 - ieeexplore.ieee.org
Searchable public key encryption (SPKE) is a useful public key cryptographic primitive that
allows a user to perform keyword searches over publicly encrypted messages on an …

Blockchain-aided privacy-preserving medical data sharing scheme for e-healthcare system

J Liu, Y Fan, R Sun, L Liu, C Wu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Due to the massive applications of Internet of Things (IoT) and the prevalence of wearable
devices, e-healthcare systems are widely deployed in medical institutions. As a significant …

File-centric multi-key aggregate keyword searchable encryption for industrial internet of things

R Zhou, X Zhang, X Du, X Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cloud storage has been used to reduce the cost and support convenient collaborations for
industrial Internet of things (IIoT) data management. When data owners share IIoT data with …

Efficient and expressive keyword search over encrypted data in cloud

H Cui, Z Wan, RH Deng, G Wang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Searchable encryption allows a cloud server to conduct keyword search over encrypted data
on behalf of the data users without learning the underlying plaintexts. However, most …

Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms

K Yang, K Zhang, X Jia, MA Hasan, XS Shen - Information Sciences, 2017 - Elsevier
Data publish-subscribe service is an effective approach to selectively share and selectively
receive data. Towards the huge amount of data generated in our daily life, cloud systems …

Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search

H Wang, X Dong, Z Cao - IEEE Transactions on Services …, 2017 - ieeexplore.ieee.org
ABKS has drawn much attention from research and industry in recent years, an ABKS
scheme is an encryption scheme that supports keyword search and access control. Attribute …

Attribute-based hybrid boolean keyword search over outsourced encrypted data

K He, J Guo, J Weng, J Weng, JK Liu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With cloud computing becoming increasingly popular, there has been a rapid increase in the
number of data owners who outsource their data to the cloud while allowing users to retrieve …