|
[ADP12] M. Abdalla, A. De Caro, and D. H. Phan, “Generalized key delegation for wildcarded identity-based and inner-product encryption,” IEEE Transactions on Information Forensics and security, vol. 7, no. 6, pp. 1695–1706, 2012 (cit. p. 3).
[APW10] H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon, “RACS: A case for cloud storage diversity,” in ACM Symposium on Cloud Computing, 2010 (cit. p. 1).
[BCO+04] D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in EUROCRYPT, 2004 (cit. p. 1).
[CMY+16] R. Chen, Y. Mu, G. Yang, et al., “Server-aided public key encryption with keyword search,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 12, pp. 2833–2842, 2016 (cit. p. 1).
[Con85] J. H. Conway, Atlas of finite groups: maximal subgroups and ordinary characters for simple groups. Oxford University Press, 1985 (cit. p. 12).
[CDL+17] H. Cui, R. H. Deng, J. K. Liu, and Y. Li, “Attribute-based encryption with expressive and authorized keyword search,” in Australasian Conference on Information Security and Privacy, Springer, 2017, pp. 106–126 (cit. p. 4).
[Hay08] B. Hayes, Cloud computing, 2008 (cit. p. 1).
[JMG+16] P. Jiang, Y. Mu, F. Guo, and Q. Wen, “Public key encryption with authorized keyword search,” in ACISP, 2016 (cit. pp. 1, 2, 4, 5, 9, 10, 29–32).
[LOS+10] A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, “Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption,” in EUROCRYPT, 2010 (cit. pp. 12, 13).
[LTT+21] Z.-Y. Liu, Y.-F. Tseng, R. Tso, Y.-C. Chen, and M. Mambo, “Identity-certifying authority-aided identity-based searchable encryption framework in cloud systems,” IEEE Systems Journal, 2021 (cit. p. 1).
[OT09] T. Okamoto and K. Takashima, “Hierarchical predicate encryption for inner-products,” in EUROCRYPT, 2009 (cit. pp. 2, 11).
[OT10] ——, “Fully secure functional encryption with general relations from the decisional linear assumption,” in CRYPTO, 2010 (cit. p. 13).
[QLD+09] L. Qian, Z. Luo, Y. Du, and L. Guo, “Cloud computing: An overview,” in IEEE International Conference on Cloud Computing, 2009 (cit. p. 1).
[QCH+20] B. Qin, Y. Chen, Q. Huang, X. Liu, and D. Zheng, “Public-key authenticated encryption with keyword search revisited: Security model and constructions,” Information Sciences, vol. 516, pp. 515–528, 2020 (cit. p. 1).
[SYL+14] W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, “Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud,” in IEEE INFOCOM 2014-IEEE conference on computer communications, IEEE, 2014, pp. 226–234 (cit. p. 5).
[WC22] J. Wang and S. S. Chow, “Omnes pro uno: Practical multi-writer encrypted database,” in USENIX Security, 2022 (cit. p. 1).
[WCX+22] P. Wang, B. Chen, T. Xiang, and Z. Wang, “Lattice-based public key searchable encryption with fine-grained access control for edge computing,” Future Generation Computer Systems, vol. 127, pp. 373–383, 2022 (cit. p. 1).
[WQS+21] T. Wang, Y. Quan, X. S. Shen, et al., “A privacy-enhanced retrieval technology for the cloud-assisted internet of things,” IEEE Transactions on Industrial Informatics, 2021 (cit. p. 1).
[Wat09] B. Waters, “Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions,” in Annual International Cryptology Conference, Springer, 2009, pp. 619–636 (cit. p. 19).
[WZC+14] L. Wei, H. Zhu, Z. Cao, et al., “Security and privacy for storage and computation in cloud computing,” Information Sciences, vol. 258, pp. 371–386, 2014 (cit. p. 1).
[XLZ+19] L. Xu, W. Li, F. Zhang, R. Cheng, and S. Tang, “Authorized keyword searches on public key encrypted data with time controlled keyword privacy,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2096–2109, 2019 (cit. pp. 4, 5).
|