An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks

Q Huang, H Li - Information Sciences, 2017 - Elsevier
How to efficiently search over encrypted data is an important and interesting problem in the
cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with …

Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds

Y Yang, M Ma - IEEE Transactions on Information Forensics …, 2015 - ieeexplore.ieee.org
An electronic health (e-health) record system is a novel application that will bring great
convenience in healthcare. The privacy and security of the sensitive personal information …

Public-key authenticated encryption with keyword search revisited: Security model and constructions

B Qin, Y Chen, Q Huang, X Liu, D Zheng - Information Sciences, 2020 - Elsevier
In cloud era, it is necessary to store sensitive data in an encrypted form. This arises the
interesting and challenging problem of searching on encrypted data. However, previous …

Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems

C Wang, T Zhou, J Shen, W Wang, X Zhou - Future Generation Computer …, 2023 - Elsevier
Driven by artificial intelligence and network communication technology, intelligent 6G
wireless systems have gradually become an important environment for users to enjoy data …

Designated-server identity-based authenticated encryption with keyword search for encrypted emails

H Li, Q Huang, J Shen, G Yang, W Susilo - Information Sciences, 2019 - Elsevier
In encrypted email system, how to search over encrypted cloud emails without decryption is
an important and practical problem. Public key encryption with keyword search (PEKS) is an …

Privacy-preserving and pairing-free multirecipient certificateless encryption with keyword search for cloud-assisted IIoT

Y Lu, J Li, Y Zhang - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Nowadays, cloud-assisted Industrial Internet of Things (IIoT) has become pervasive in
modern enterprises, because it supplies a promising way to transform the operation mode of …

Lightweight distributed secure data management system for health internet of things

Y Yang, X Zheng, C Tang - Journal of Network and Computer Applications, 2017 - Elsevier
Abstract Internet of Things (IoT) connects various kinds of sensors and smart devices using
the internet to collect data. The adoption of IoT in medical care field will bring great …

Lightweight sharable and traceable secure mobile health system

Y Yang, X Liu, RH Deng, Y Li - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Mobile health (mHealth) has emerged as a new patient centric model which allows real-time
collection of patient data via wearable sensors, aggregation and encryption of these data at …

A review on smart healthcare employing quantum internet of things

K Sutradhar, R Venkatesh… - IEEE Engineering …, 2024 - ieeexplore.ieee.org
The Quantum Internet of Things (QIoT) in the healthcare industry holds the promise of
transforming patient care, diagnostics, and medical research. Quantum-enhanced sensors …

Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks

Y Lu, J Li, Y Zhang - IEEE Transactions on Services Computing, 2019 - ieeexplore.ieee.org
Searchable public key encryption (SPKE) is a useful public key cryptographic primitive that
allows a user to perform keyword searches over publicly encrypted messages on an …