Provable Security - 6th International Conference, ProvSec
Public Key Encryption with Keyword Search (PEKS) is a primitive with such functionality that provides delegation of exact-match searches. As it is important that ciphertexts preserve data privacy, it is also important that trapdoors do not expose the user’s search criteria. Efficient identity-based broadcast encryption with keyword May 03, 2019 Cryptology ePrint Archive: Listing for 2012 TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems Kan Yang and Zhen Liu and Zhenfu Cao and Xiaohua Jia and Duncan S. Wong and Kui Ren 2012/650 ( PDF) Formal analysis of privacy in Direct Anonymous Attestation schemes … Secure channel free public key encryption with multiple Abstract / Description. With a further exploration of modern cryptography, people realize that Public Key Infrastructure (PKI) is not perfect but has its limitations. One of the l
We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS). We define computational and statistical relaxations of the existing notion of perfect consistency, show that the scheme of Boneh et al. in Eurocrypt 2004 is computationally consistent
Efficient identity-based broadcast encryption with keyword May 03, 2019 Cryptology ePrint Archive: Listing for 2012 TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems Kan Yang and Zhen Liu and Zhenfu Cao and Xiaohua Jia and Duncan S. Wong and Kui Ren 2012/650 ( PDF) Formal analysis of privacy in Direct Anonymous Attestation schemes …
With the advent of cloud computing, data privacy has become one of critical security issues and attracted much attention as more and more mobile devices are relying on the services in cloud. To protect data privacy, users usually encrypt their sensitive data before uploading to cloud servers, which renders the data utilization to be difficult. The ciphertext retrieval is able to realize
Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu: Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings. Lecture Notes in Computer Science 7496, Springer 2012, ISBN 978-3-642-33271-5