Secure and efficient attribute-based encryption with keyword search

被引:0
|
作者
机构
[1] Wang, Haijiang
[2] Dong, Xiaolei
[3] Cao, Zhenfu
[4] Li, Dongmei
来源
Dong, Xiaolei (dongxiaolei@sei.ecnu.edu.cn) | 1600年 / Oxford University Press卷 / 61期
关键词
This work was supported in part by the National Natural Science Foundation of China (Grant nos. 61632012 and 61672239); and in part by Shanghai High-tech field project under (Grant no. 16511101400);
D O I
暂无
中图分类号
学科分类号
摘要
26
引用
收藏
相关论文
共 50 条
  • [1] Secure and Efficient Attribute-Based Encryption with Keyword Search
    Wang, Haijiang
    Dong, Xiaolei
    Cao, Zhenfu
    Li, Dongmei
    COMPUTER JOURNAL, 2018, 61 (08): : 1133 - 1142
  • [2] Attribute-based public encryption with keyword search
    Li, S. (lishuang@th.btbu.edu.cn), 1600, Science Press (37):
  • [3] Attribute-Based Encryption with Expressive and Authorized Keyword Search
    Cui, Hui
    Deng, Robert H.
    Liu, Joseph K.
    Li, Yingjiu
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 106 - 126
  • [4] Attribute-Based Encryption with Multi-Keyword Search
    Li, Runhe
    Zheng, Dong
    Zhang, Yinghui
    Su, Haonan
    Yang, Menglei
    Lang, Pengzhen
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 172 - 177
  • [5] Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword Search
    Yang, Husheng
    Ma, Sha
    Zhou, Pan
    Yang, Guiquan
    Huang, Qiong
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT II, 2024, 14527 : 356 - 367
  • [6] Provably secure attribute-based authenticated encryption with keyword search from ideal lattices
    Lisha YAO
    Lin HOU
    Jian WENG
    Feixiang ZHAO
    Science China(Information Sciences), 2024, 67 (01) : 308 - 309
  • [7] Provably secure attribute-based authenticated encryption with keyword search from ideal lattices
    Lisha Yao
    Lin Hou
    Jian Weng
    Feixiang Zhao
    Science China Information Sciences, 2024, 67
  • [8] Provably secure attribute-based authenticated encryption with keyword search from ideal lattices
    Yao, Lisha
    Hou, Lin
    Weng, Jian
    Zhao, Feixiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2024, 67 (01)
  • [9] Attribute-Based Proxy Re-Encryption with Keyword Search
    Shi, Yanfeng
    Liu, Jiqiang
    Han, Zhen
    Zheng, Qingji
    Zhang, Rui
    Qiu, Shuo
    PLOS ONE, 2014, 9 (12):
  • [10] Attribute-based keyword search encryption for power data protection
    Zhang, Xun
    Mu, Dejun
    Zhao, Jinxiong
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (02):