IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services
Yan XU, Ming WANG, Hong ZHONG, Sheng ZHONG
IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services
[1] |
He D B, Kumar N, Zeadally S, Wang H Q. Certificateless provable data possession scheme for cloud-based smart grid data management systems. IEEE Transactions on Information Forensics and Security, 2018, 14(3): 1232–1241
CrossRef
Google scholar
|
[2] |
He D B, Zeadally S, Wu L B. Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal, 2018, 12(1): 64–73
CrossRef
Google scholar
|
[3] |
Ma S. Identity-based encryption with outsourced equality test in cloud computing. Information Sciences An International Journal, 2016, 328: 389–402
CrossRef
Google scholar
|
[4] |
Yang G M, Tan C H, Huang Q, Wong D S. Probabilistic public key encryption with equality test. In: Proceedings of International Conference on Topics in Cryptology. 2010, 119–131
CrossRef
Google scholar
|
[5] |
Jin W B, Rhee H S, Park H A, Dong H L. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Lecture Notes in Computer Science, 2006, 1: 75–83
CrossRef
Google scholar
|
[6] |
Lee H T, Wang H X, Zhang K. Security analysis and modification of IDbased encryption with equality test from ACISP 2017. In: Proceedings of Australasian Conference on Information Security and Privacy. 2018, 780–786
CrossRef
Google scholar
|
[7] |
Ling Y H, Ma S, Huang Q, Xiang R, Li X M. Group id-based encryption with equality test. In: Proceedings of Australasian Conference on Information Security and Privacy. 2019, 39–57
CrossRef
Google scholar
|
[8] |
Bellare M, Namprempre C, Pointcheval D, Semanko M. The one-more- RSA-inversion problems and the security of chaum’s blind signature scheme. Journal of Cryptology, 2003, 16(3): 185–215
CrossRef
Google scholar
|
/
〈 | 〉 |