4.2 Article

A provably secure certificateless public key encryption with keyword search

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Certificateless searchable public key encryption scheme for mobile healthcare system

Mimi Ma et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Automation & Control Systems

Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things

Mimi Ma et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems

Tsu-Yang Wu et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices

Tung-Tso Tsai et al.

INFORMATICA (2017)

Article Telecommunications

Certificateless public key encryption with keyword search

Peng Yanguo et al.

China Communications (2015)

Article Telecommunications

Efficient searchable ID-based encryption with a designated server

Tsu-Yang Wu et al.

ANNALS OF TELECOMMUNICATIONS (2014)

Article Computer Science, Theory & Methods

Provable certificateless generalized signcryption scheme

Caixue Zhou et al.

DESIGNS CODES AND CRYPTOGRAPHY (2014)

Article Computer Science, Artificial Intelligence

An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds

Seung-Hyun Seo et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2014)

Article Computer Science, Information Systems

Unforgeability of an improved certificateless signature scheme in the standard model

Chaowen Guan et al.

IET INFORMATION SECURITY (2014)

Article Computer Science, Information Systems

Publicly verifiable multi-secret sharing scheme from bilinear pairings

Tsu-Yang Wu et al.

IET INFORMATION SECURITY (2013)

Article Mathematics, Applied

Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester

Wei-Chuen Yau et al.

INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS (2013)

Article Computer Science, Hardware & Architecture

A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants

Tsu-Yang Wu et al.

COMPUTER NETWORKS (2012)

Article Computer Science, Interdisciplinary Applications

An enhanced searchable public key encryption scheme with a designated tester and its extensions

Chengyu Hu et al.

JOURNAL OF COMPUTERS (2012)

Article Computer Science, Hardware & Architecture

An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices

Tsu-Yang Wu et al.

COMPUTER JOURNAL (2010)

Article Computer Science, Software Engineering

Trapdoor security in a searchable public-key encryption scheme with a designated tester

Hyun Sook Rhee et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2010)

Article Engineering, Electrical & Electronic

Secure searchable public key encryption scheme against keyword guessing attacks

Hyun Sook Rhee et al.

IEICE ELECTRONICS EXPRESS (2009)

Article Computer Science, Information Systems

A survey of certificateless encryption schemes and security models

Alexander W. Dent

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2008)

Article Computer Science, Information Systems

Identity-based key agreement protocols from pairings

L. Chen et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2007)