|
|
|
IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services |
Yan XU1,2, Ming WANG1, Hong ZHONG1( ), Sheng ZHONG2 |
1. School of Computer Science and Technology, Anhui University, Hefei 230601, China 2. State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210023, China |
|
|
|
|
|
|
Corresponding Author(s):
Hong ZHONG
|
|
Just Accepted Date: 25 August 2020
Issue Date: 24 August 2021
|
|
| 1 |
D B He, N Kumar, S Zeadally, H Q Wang. Certificateless provable data possession scheme for cloud-based smart grid data management systems. IEEE Transactions on Information Forensics and Security, 2018, 14(3): 1232–1241
https://doi.org/10.1109/TII.2017.2761806
|
| 2 |
D B He, S Zeadally, L B Wu. Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal, 2018, 12(1): 64–73
https://doi.org/10.1109/JSYST.2015.2428620
|
| 3 |
S Ma. Identity-based encryption with outsourced equality test in cloud computing. Information Sciences An International Journal, 2016, 328: 389–402
https://doi.org/10.1016/j.ins.2015.08.053
|
| 4 |
G M Yang, C H Tan, Q Huang, D S Wong. Probabilistic public key encryption with equality test. In: Proceedings of International Conference on Topics in Cryptology. 2010, 119–131
https://doi.org/10.1007/978-3-642-11925-5_9
|
| 5 |
W B Jin, H S Rhee, H A Park, H L Dong. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Lecture Notes in Computer Science, 2006, 1: 75–83
https://doi.org/10.1007/11844662_6
|
| 6 |
H T Lee, H X Wang, K Zhang. Security analysis and modification of IDbased encryption with equality test from ACISP 2017. In: Proceedings of Australasian Conference on Information Security and Privacy. 2018, 780–786
https://doi.org/10.1007/978-3-319-93638-3_46
|
| 7 |
Y H Ling, S Ma, Q Huang, R Xiang, X M Li. Group id-based encryption with equality test. In: Proceedings of Australasian Conference on Information Security and Privacy. 2019, 39–57
https://doi.org/10.1007/978-3-030-21548-4_3
|
| 8 |
M Bellare, C Namprempre, D Pointcheval, M Semanko. The one-more- RSA-inversion problems and the security of chaum’s blind signature scheme. Journal of Cryptology, 2003, 16(3): 185–215
https://doi.org/10.1007/s00145-002-0120-1
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
| |
Shared |
|
|
|
|
| |
Discussed |
|
|
|
|