96
Views
3
CrossRef citations to date
0
Altmetric
Special Section: Intelligent Automation with Applications to Agriculture

Multi-Key Searchable Encryption with Designated Server

, , &

References

  • Arriaga, A., Tang, Q., & Ryan, P. (2014). Trapdoor privacy in asymmetric searchable encryption schemes. Progress in Cryptology–AFRICACRYPT , 31–50. Springer.
  • Baek, J., Safavi-Naini, R., & Susilo, W. (2008). Public key encryption with keyword search revisited. Computational Science and Its Applications–ICCSA, 1249–1259. Springer.
  • Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. Paper presented at the Advances in Cryptology-Eurocrypt.
  • Chen, C.-L., Yang, T.-T., Leu, F.-Y., & Huang, Y.-L. (2014). Designing a healthcare authorization model based on cloud authentication. Intelligent Automation & Soft Computing, 20, 365–379.
  • Dong, Q., Guan, Z., Wu, L., & Chen, Z. (2013). Fuzzy keyword search over encrypted data in the public key setting. Web-Age Information Management, 729–740. Springer.
  • Emura, K., Miyaji, A., & Omote, K. (2011). Adaptive secure-channel free public-key encryption with keyword search implies timed release encryption. Information Security, 102–118. Springer.
  • Fang, L., Susilo, W., Ge, C., & Wang, J. (2009). A secure channel free public key encryption with keyword search scheme without random oracle. Cryptology and Network Security, 248–258. Springer.
  • Feng, Y., Ma, H., & Chen, X. (2015). Efficient and verifiable outsourcing scheme of sequence comparisons. Intelligent Automation & Soft Computing, 21, 51–63.
  • Hu, C., He, P., & Liu, P. (2012). Public key encryption with multi-keyword search Network Computing and Information Security, 568–576. Springer.
  • Hu, C., & Liu, P. (2011). A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension. Advances in Computer Science, Environment, Ecoinformatics, and Education, 131–136. Springer.
  • Hwang, Y. H., & Lee, P. J. (2007). Public key encryption with conjunctive keyword search and its extension to a multi-user system Pairing-Based Cryptography–Pairing , 2–22. Springer.
  • Ibraimi, L., Nikova, S., Hartel, P., & Jonker, W. (2011). Public-key encryption with delegated search. Paper presented at the Applied Cryptography and Network Security.
  • López-Alt, A., Tromer, E., & Vaikuntanathan, V. (2012). On-the-fly multiparty computation on the cloud multikey fully homomorphic encryption. Paper presented at the Proceedings of the forty-fourth annual ACM symposium on Theory of computing.
  • Popa, R. A. & Zeldovich, N. (2013). Multi-Key Searchable Encryption. IACR Cryptology ePrint Archive, 2013, 508.
  • Rhee, H. S., Park, J. H., & Lee, D. H. (2012). Generic construction of designated tester public-key encryption with keyword search. Information Sciences, 205, 93–109.10.1016/j.ins.2012.03.020
  • Rhee, H. S., Park, J. H., Susilo, W., & Lee, D. H. (2009). Improved searchable public key encryption with designated tester. Paper presented at the Proceedings of the 4th International Symposium on Information, Computer, and Communications Security.
  • Rhee, H. S., Park, J. H., Susilo, W., & Lee, D. H. (2010). Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software, 83, 763–771.10.1016/j.jss.2009.11.726
  • Rhee, H. S., Susilo, W., & Kim, H.-J. (2009). Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electronics Express, 6, 237–243.10.1587/elex.6.237
  • Wu, T.-Y., Tsai, T.-T., & Tseng, Y.-M. (2014). Efficient searchable ID-based encryption with a designated server. annals of telecommunications-annales des télécommunications, 69, 391–402.10.1007/s12243-013-0398-z
  • Yau, W.-C., Phan, R. C.-W., Heng, S.-H., & Goi, B.-M. (2013). Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. International Journal of Computer Mathematics, 90, 2581–2587.10.1080/00207160.2013.778985

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.