Searchable encryption for healthcare clouds: A survey
R Zhang, R Xue, L Liu - IEEE Transactions on Services …, 2017 - ieeexplore.ieee.org
Outsourcing medical data and their search services to a third party cloud have been a
popular trend for many medical practices, because using healthcare cloud services can help …
popular trend for many medical practices, because using healthcare cloud services can help …
Searchable symmetric encryption: improved definitions and efficient constructions
Searchable symmetric encryption (SSE) allows a party to outsource the storage of its data to
another party (a server) in a private manner, while maintaining the ability to selectively …
another party (a server) in a private manner, while maintaining the ability to selectively …
Trapdoors for hard lattices and new cryptographic constructions
We show how to construct a variety of" trapdoor" cryptographic tools assuming the worst-
case hardness of standard lattice problems (such as approximating the length of the shortest …
case hardness of standard lattice problems (such as approximating the length of the shortest …
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
B Waters - International workshop on public key cryptography, 2011 - Springer
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE)
under concrete and noninteractive cryptographic assumptions in the standard model. Our …
under concrete and noninteractive cryptographic assumptions in the standard model. Our …
Cryptographic cloud storage
We consider the problem of building a secure cloud storage service on top of a public cloud
infrastructure where the service provider is not completely trusted by the customer. We …
infrastructure where the service provider is not completely trusted by the customer. We …
Highly-scalable searchable symmetric encryption with support for boolean queries
This work presents the design and analysis of the first searchable symmetric encryption
(SSE) protocol that supports conjunctive search and general Boolean queries on outsourced …
(SSE) protocol that supports conjunctive search and general Boolean queries on outsourced …
Conjunctive, subset, and range queries on encrypted data
We construct public-key systems that support comparison queries (x≥ a) on encrypted data
as well as more general queries such as subset queries (x∈ S). Furthermore, these systems …
as well as more general queries such as subset queries (x∈ S). Furthermore, these systems …
Outsourcing the decryption of {ABE} ciphertexts
Attribute-based encryption (ABE) is a new vision for public key encryption that allows users
to encrypt and decrypt messages based on user attributes. For example, a user can create a …
to encrypt and decrypt messages based on user attributes. For example, a user can create a …
Predicate encryption supporting disjunctions, polynomial equations, and inner products
Predicate encryption is a new paradigm generalizing, among other things, identity-based
encryption. In a predicate encryption scheme, secret keys correspond to predicates and …
encryption. In a predicate encryption scheme, secret keys correspond to predicates and …
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
B Waters - Annual international cryptology conference, 2009 - Springer
We present a new methodology for proving security of encryption systems using what we
call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption …
call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption …