IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services

Yan XU, Ming WANG, Hong ZHONG, Sheng ZHONG

PDF(352 KB)
PDF(352 KB)
Front. Comput. Sci. ›› 2021, Vol. 15 ›› Issue (6) : 156814. DOI: 10.1007/s11704-020-9396-2
LETTER

IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services

Author information +
History +

Cite this article

Download citation ▾
Yan XU, Ming WANG, Hong ZHONG, Sheng ZHONG. IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services. Front. Comput. Sci., 2021, 15(6): 156814 https://doi.org/10.1007/s11704-020-9396-2

References

[1]
He D B, Kumar N, Zeadally S, Wang H Q. Certificateless provable data possession scheme for cloud-based smart grid data management systems. IEEE Transactions on Information Forensics and Security, 2018, 14(3): 1232–1241
CrossRef Google scholar
[2]
He D B, Zeadally S, Wu L B. Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal, 2018, 12(1): 64–73
CrossRef Google scholar
[3]
Ma S. Identity-based encryption with outsourced equality test in cloud computing. Information Sciences An International Journal, 2016, 328: 389–402
CrossRef Google scholar
[4]
Yang G M, Tan C H, Huang Q, Wong D S. Probabilistic public key encryption with equality test. In: Proceedings of International Conference on Topics in Cryptology. 2010, 119–131
CrossRef Google scholar
[5]
Jin W B, Rhee H S, Park H A, Dong H L. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Lecture Notes in Computer Science, 2006, 1: 75–83
CrossRef Google scholar
[6]
Lee H T, Wang H X, Zhang K. Security analysis and modification of IDbased encryption with equality test from ACISP 2017. In: Proceedings of Australasian Conference on Information Security and Privacy. 2018, 780–786
CrossRef Google scholar
[7]
Ling Y H, Ma S, Huang Q, Xiang R, Li X M. Group id-based encryption with equality test. In: Proceedings of Australasian Conference on Information Security and Privacy. 2019, 39–57
CrossRef Google scholar
[8]
Bellare M, Namprempre C, Pointcheval D, Semanko M. The one-more- RSA-inversion problems and the security of chaum’s blind signature scheme. Journal of Cryptology, 2003, 16(3): 185–215
CrossRef Google scholar

RIGHTS & PERMISSIONS

2021 Higher Education Press
AI Summary AI Mindmap
PDF(352 KB)

Accesses

Citations

Detail

Sections
Recommended

/