Computer Science ›› 2018, Vol. 45 ›› Issue (7): 162-166.doi: 10.11896/j.issn.1002-137X.2018.07.028
• Information Security • Previous Articles Next Articles
LIU Xin-yu1,LI Lang1,XIAO Bing-bing2
CLC Number:
[1]HOHENBERGER S,WATERS B.Attribute-based encryptionwith fast decryption.Berlin:Springer,2013:162-179. [2]ATTRAPADUNG N,HERRANZ J,LAGUILLAUMIE F,etal.Attribute-based encryption schemes with constant-size ciphertexts.Theoretical Computer Science,2012,422(3):15-38. [3]KHADER D.Introduction to attribute based searchable encryption[M]∥Communications and Multimedia Security.Springer Berlin Heidelberg,2014:131-135. [4]LI M,YU S,ZHENG Y,et al.Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE Transactions on Parallel and Distributed Systems,2013,24(1):131-143. [5]GOLLE P,STADDON J,WATERS B.Secure conjunctive keyword search over encrypted data[C]∥Proc of the applied Cryptography and Network Security.Springer Berlin Heidelberg,2004:31-45. [6]CAO N,WANG C,LI M,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data.IEEE Transa-ctions on Parallel and Distributed Systems,2014,25(1):222-233. [7]SUN W,WANG B,CAO N,et al.Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ran-king[C]∥Proc of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security.ACM,2013:71-82. [8]CURTMOLA R,GARAY J,KAMARA S,et al.Searchablesymmetric encryption:Improved definitions and efficient constructions.Journal of Computer Security,2011,19(5):895-934. [9]GOLLE P,STADDON J,WATERS B.Secure Conjunctive Keyword Search over Encrypted Data.Berlin:Springer,2004:31-45. [10]KAMARA S,PAPAMANTHOU C,ROEDER T.Dynamic sea-rchable symmetric encryption[C]∥Acm Conference on Computer & Communications Security.ACM,2012:965-976. [11]KAMARA S,PAPAMANTHOU C.Parallel and Dynamic Searchable Symmetric Encryption∥Berlin:Springer,2013:258-274. [12]CASH D,JARECKI S,JUTLA C,et al.Highly-Scalable Searcha-ble Symmetric Encryption with Support for Boolean Queries.Berlin:Springer,2013:353-373. [13]AU M H,TSANG P P,SUSILO W,et al.Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems.Berlin:Springer,2009:295-308. [14]SHAO J,CAO Z,LIANG X,et al.Proxy re-encryption withkeyword search.Information Sciences,2010,180(13):2576-2587. [15]LEE S H,LEE I Y.A Study of Practical Proxy Reencryptionwith a Keyword Search Scheme considering Cloud Storage Structure.The Scientific World Journal,2014,2014(2):1661-1667. [16]FANG L,SUSILO W,GE C,et al.Chosen-ciphertext secureanonymous conditional proxy re-encryption with keyword search.Theoretical Computer Science,2012,4629(1):39-58. [17]DODIS Y,OSTROVSKY R,REYZIN L,et al.Fuzzy extractors:How to generate strong keys from biometrics and other noisy data.SIAM Journal on Computing,2008,38(1):97-139. |
[1] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[2] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[3] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[4] | LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325. |
[5] | DOU Jia-wei. Privacy-preserving Hamming and Edit Distance Computation and Applications [J]. Computer Science, 2022, 49(9): 355-360. |
[6] | GAO Chun-gang, WANG Yong-jie, XIONG Xin-li. MTDCD:A Hybrid Defense Mechanism Against Network Intrusion [J]. Computer Science, 2022, 49(7): 324-331. |
[7] | LIANG Zhen-zhen, XU Ming. Key Agreement Scheme Based on Ocean Acoustic Channel [J]. Computer Science, 2022, 49(6): 356-362. |
[8] | DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284. |
[9] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[10] | WEI Hong-ru, LI Si-yue, GUO Yong-hao. Secret Reconstruction Protocol Based on Smart Contract [J]. Computer Science, 2022, 49(6A): 469-473. |
[11] | LIANG Yi-wen, DU Yu-song. Timing Attack Resilient Sampling Algorithms for Binary Gaussian Based on Knuth-Yao [J]. Computer Science, 2022, 49(6A): 485-489. |
[12] | YAN Meng, LIN Ying, NIE Zhi-shen, CAO Yi-fan, PI Huan, ZHANG Lan. Training Method to Improve Robustness of Federated Learning [J]. Computer Science, 2022, 49(6A): 496-501. |
[13] | CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543. |
[14] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[15] | LIU Lin-yun, CHEN Kai-yan, LI Xiong-wei, ZHANG Yang, XIE Fang-fang. Overview of Side Channel Analysis Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(5): 296-302. |
|