Lightweight Public Key Authenticated Encryption With Keyword Search Against Adaptively-Chosen-Targets Adversaries for Mobile Devices
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Lightweight Public Key Authenticated Encryption With Keyword Search Against Adaptively-Chosen-Targets Adversaries for Mobile Devices
Authors
Keywords
-
Journal
IEEE TRANSACTIONS ON MOBILE COMPUTING
Volume 21, Issue 12, Pages 4397-4409
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Online
2021-05-05
DOI
10.1109/tmc.2021.3077508
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Privacy preserving search services against online attack
- (2020) Yi Zhao et al. COMPUTERS & SECURITY
- Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage
- (2020) Jiguo Li et al. IEEE Systems Journal
- Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs
- (2020) Yang Lu et al. IEEE Transactions on Industrial Informatics
- Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks
- (2020) Yang Lu et al. IEEE Transactions on Services Computing
- Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things
- (2019) Libing Wu et al. Annals of Telecommunications
- Designated-server identity-based authenticated encryption with keyword search for encrypted emails
- (2019) Hongbo Li et al. INFORMATION SCIENCES
- Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT
- (2019) Yang Lu et al. IEEE Internet of Things Journal
- Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
- (2019) Yinbin Miao et al. IEEE Transactions on Dependable and Secure Computing
- Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities
- (2019) Lei Zhang et al. IEEE Transactions on Services Computing
- Certificateless searchable public key encryption scheme for mobile healthcare system
- (2018) Mimi Ma et al. COMPUTERS & ELECTRICAL ENGINEERING
- Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things
- (2018) Mimi Ma et al. IEEE Transactions on Industrial Informatics
- Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
- (2018) Jianting Ning et al. IEEE Transactions on Information Forensics and Security
- Efficient and secure searchable encryption protocol for cloud-based Internet of Things
- (2018) Libing Wu et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
- (2018) Libing Wu et al. SOFT COMPUTING
- Certificateless public integrity checking of group shared data on cloud storage
- (2018) Jiguo Li et al. IEEE Transactions on Services Computing
- MMCSACC: A Multi-Source Multimedia Conference System Assisted by Cloud Computing for Smart Campus
- (2018) Wei Zhang et al. IEEE Access
- Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems
- (2018) Yang Lu et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Passive Attacks Against Searchable Encryption
- (2018) Jianting Ning et al. IEEE Transactions on Information Forensics and Security
- Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement
- (2018) Yang Lu et al. INFORMATION SCIENCES
- Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things
- (2018) Yinbin Miao et al. IEEE Transactions on Industrial Informatics
- DeepDirect: Learning Directions of Social Ties with Edge-Based Network Embedding
- (2018) Chaokun Wang et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- Certificateless Public Key Authenticated Encryption with Keyword Search for Industrial Internet of Things
- (2017) Debiao He et al. IEEE Transactions on Industrial Informatics
- An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
- (2017) Qiong Huang et al. INFORMATION SCIENCES
- Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
- (2017) Lixue Sun et al. Science China-Information Sciences
- KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
- (2017) Jiguo Li et al. IEEE Transactions on Services Computing
- Server-Aided Public Key Encryption With Keyword Search
- (2016) Rongmao Chen et al. IEEE Transactions on Information Forensics and Security
- OMICC: an overlay multicast infrastructure based on cloud computing for streaming media data distribution
- (2016) Wei Zhang et al. SCIENCEASIA
- A secure biometric authentication based on PEKS
- (2015) Yue Zhang et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- On security against the server in designated tester public key encryption with keyword search
- (2015) Zhi-Yi Shao et al. INFORMATION PROCESSING LETTERS
- I-sieve: An inline high performance deduplication system used in cloud storage
- (2015) Jibin Wang et al. TSINGHUA SCIENCE AND TECHNOLOGY
- Generic constructions of secure-channel free searchable encryption with adaptive security
- (2014) Keita Emura et al. Security and Communication Networks
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- (2013) Liming Fang et al. INFORMATION SCIENCES
- Generic construction of designated tester public-key encryption with keyword search
- (2012) Hyun Sook Rhee et al. INFORMATION SCIENCES
- Trapdoor security in a searchable public-key encryption scheme with a designated tester
- (2009) Hyun Sook Rhee et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Constructing PEKS schemes secure against keyword guessing attacks is possible?
- (2008) Ik Rae Jeong et al. COMPUTER COMMUNICATIONS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreDiscover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversation