Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2021, Vol. 15 Issue (6) : 156814    https://doi.org/10.1007/s11704-020-9396-2
LETTER
IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services
Yan XU1,2, Ming WANG1, Hong ZHONG1(), Sheng ZHONG2
1. School of Computer Science and Technology, Anhui University, Hefei 230601, China
2. State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210023, China
 Download: PDF(352 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Corresponding Author(s): Hong ZHONG   
Just Accepted Date: 25 August 2020   Issue Date: 24 August 2021
 Cite this article:   
Yan XU,Ming WANG,Hong ZHONG, et al. IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services[J]. Front. Comput. Sci., 2021, 15(6): 156814.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-020-9396-2
https://academic.hep.com.cn/fcs/EN/Y2021/V15/I6/156814
1 D B He, N Kumar, S Zeadally, H Q Wang. Certificateless provable data possession scheme for cloud-based smart grid data management systems. IEEE Transactions on Information Forensics and Security, 2018, 14(3): 1232–1241
https://doi.org/10.1109/TII.2017.2761806
2 D B He, S Zeadally, L B Wu. Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal, 2018, 12(1): 64–73
https://doi.org/10.1109/JSYST.2015.2428620
3 S Ma. Identity-based encryption with outsourced equality test in cloud computing. Information Sciences An International Journal, 2016, 328: 389–402
https://doi.org/10.1016/j.ins.2015.08.053
4 G M Yang, C H Tan, Q Huang, D S Wong. Probabilistic public key encryption with equality test. In: Proceedings of International Conference on Topics in Cryptology. 2010, 119–131
https://doi.org/10.1007/978-3-642-11925-5_9
5 W B Jin, H S Rhee, H A Park, H L Dong. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Lecture Notes in Computer Science, 2006, 1: 75–83
https://doi.org/10.1007/11844662_6
6 H T Lee, H X Wang, K Zhang. Security analysis and modification of IDbased encryption with equality test from ACISP 2017. In: Proceedings of Australasian Conference on Information Security and Privacy. 2018, 780–786
https://doi.org/10.1007/978-3-319-93638-3_46
7 Y H Ling, S Ma, Q Huang, R Xiang, X M Li. Group id-based encryption with equality test. In: Proceedings of Australasian Conference on Information Security and Privacy. 2019, 39–57
https://doi.org/10.1007/978-3-030-21548-4_3
8 M Bellare, C Namprempre, D Pointcheval, M Semanko. The one-more- RSA-inversion problems and the security of chaum’s blind signature scheme. Journal of Cryptology, 2003, 16(3): 185–215
https://doi.org/10.1007/s00145-002-0120-1
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed