A survey of provably secure searchable encryption
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …
and comprehensive overview of the two main SE techniques: searchable symmetric …
Searchable encryption for healthcare clouds: A survey
R Zhang, R Xue, L Liu - IEEE Transactions on Services …, 2017 - ieeexplore.ieee.org
Outsourcing medical data and their search services to a third party cloud have been a
popular trend for many medical practices, because using healthcare cloud services can help …
popular trend for many medical practices, because using healthcare cloud services can help …
Bonsai trees, or how to delegate a lattice basis
We introduce a new lattice-based cryptographic structure called a bonsai tree, and use it to
resolve some important open problems in the area. Applications of bonsai trees include an …
resolve some important open problems in the area. Applications of bonsai trees include an …
Dual-server public-key encryption with keyword search for secure cloud storage
Searchable encryption is of increasing interest for protecting the data privacy in secure
searchable cloud storage. In this paper, we investigate the security of a well-known …
searchable cloud storage. In this paper, we investigate the security of a well-known …
An efficient public key encryption with conjunctive-subset keywords search
B Zhang, F Zhang - Journal of Network and Computer Applications, 2011 - Elsevier
Since Boneh et al. proposed the notion and construction of Public Key Encryption with
Keyword Search (PEKS) scheme, many revisions and extensions have been given …
Keyword Search (PEKS) scheme, many revisions and extensions have been given …
Proxy re-encryption with keyword search
We introduce a new cryptographic primitive, called proxy re-encryption with keyword search,
which is motivated by the following scenario in email systems: Charlie sends an encrypted …
which is motivated by the following scenario in email systems: Charlie sends an encrypted …
Secure searchable encryption: a survey
Cloud computing facilitates convenient and on-demand network access to a centralized pool
of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate …
of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate …
Efficient selective identity-based encryption without random oracles
D Boneh, X Boyen - Journal of Cryptology, 2011 - Springer
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-
identity security reductions without random oracles in groups equipped with a bilinear map …
identity security reductions without random oracles in groups equipped with a bilinear map …
A survey of public-key encryption with search functionality for cloud-assisted IoT
Nowadays, Internet of Things (IoT) is an attractive system to provide broad connectivity of a
wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines …
wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines …
Public-key encryption with registered keyword search
Abstract Public-key Encryption with Keyword Search (PEKS) enables a server to test
whether a tag from a sender and a trapdoor from a receiver contain the same keyword. In …
whether a tag from a sender and a trapdoor from a receiver contain the same keyword. In …