Academic literature on the topic 'Public key authenticated encryption with keyword search'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Public key authenticated encryption with keyword search.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Public key authenticated encryption with keyword search"
Noroozi, Mahnaz, and Ziba Eslami. "Public key authenticated encryption with keyword search: revisited." IET Information Security 13, no. 4 (2019): 336–42. http://dx.doi.org/10.1049/iet-ifs.2018.5315.
Full textLu, Jingwei, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, and Qiong Huang. "Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security." Information 14, no. 3 (2023): 142. http://dx.doi.org/10.3390/info14030142.
Full textDu, Haorui, Jianhua Chen, Ming Chen, Cong Peng, and Debiao He. "A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing." Wireless Communications and Mobile Computing 2022 (October 19, 2022): 1–15. http://dx.doi.org/10.1155/2022/2336685.
Full textDu, Haorui, Jianhua Chen, Fei Lin, Cong Peng, and Debiao He. "A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing." Security and Communication Networks 2022 (October 15, 2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.
Full textQin, Baodong, Yu Chen, Qiong Huang, Ximeng Liu, and Dong Zheng. "Public-key authenticated encryption with keyword search revisited: Security model and constructions." Information Sciences 516 (April 2020): 515–28. http://dx.doi.org/10.1016/j.ins.2019.12.063.
Full textFan, Yajun, Baodong Qin, and Dong Zheng. "A lattice-based designated-server public-key authenticated encryption with keyword search." Journal of Systems Architecture 145 (December 2023): 103031. http://dx.doi.org/10.1016/j.sysarc.2023.103031.
Full textChi, Tianyu, Baodong Qin, and Dong Zheng. "An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things." Wireless Communications and Mobile Computing 2020 (July 14, 2020): 1–11. http://dx.doi.org/10.1155/2020/8816172.
Full textHe, Debiao, Mimi Ma, Sherali Zeadally, Neeraj Kumar, and Kaitai Liang. "Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things." IEEE Transactions on Industrial Informatics 14, no. 8 (2018): 3618–27. http://dx.doi.org/10.1109/tii.2017.2771382.
Full textEmura, Keita. "Generic Construction of Fully Anonymous Broadcast Authenticated Encryption with Keyword Search with Adaptive Corruptions." IET Information Security 2023 (November 7, 2023): 1–12. http://dx.doi.org/10.1049/2023/9922828.
Full textMa, Yang, and Hassan Kazemian. "Public key authenticated encryption with multiple keywords search using Mamdani system." Evolving Systems 12, no. 3 (2021): 687–99. http://dx.doi.org/10.1007/s12530-021-09387-0.
Full textBook chapters on the topic "Public key authenticated encryption with keyword search"
Cheng, Leixiao, and Fei Meng. "Public Key Authenticated Encryption with Keyword Search from LWE." In Computer Security – ESORICS 2022. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17140-6_15.
Full textHe, Kejin, Sha Ma, and Hao Wang. "Multi-recipient Public-Key Authenticated Encryption with Keyword Search." In Intelligence Computation and Applications. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-4396-4_27.
Full textQin, Baodong, Hui Cui, Xiaokun Zheng, and Dong Zheng. "Improved Security Model for Public-Key Authenticated Encryption with Keyword Search." In Provable and Practical Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90402-9_2.
Full textWu, Tsu-Yang, Chien-Ming Chen, King-Hang Wang, Jimmy Ming-Tai Wu, and Jeng-Shyang Pan. "Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme." In Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03745-1_22.
Full textLiu, Xueqiao, Hongbo Li, Guomin Yang, Willy Susilo, Joseph Tonien, and Qiong Huang. "Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search." In Provable Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31919-9_7.
Full textYang, Pan, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Au, and Qiong Huang. "Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search." In Provable and Practical Security. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-20917-8_2.
Full textEmura, Keita. "Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search." In Applied Cryptography and Network Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54770-6_10.
Full textYang, Guiquan, Sha Ma, Hongbo Li, Husheng Yang, and Qiong Huang. "Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction." In Information Security and Cryptology. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0942-7_15.
Full textBoneh, Dan, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. "Public Key Encryption with Keyword Search." In Advances in Cryptology - EUROCRYPT 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24676-3_30.
Full textHu, Chengyu, Peng He, and Pengtao Liu. "Public Key Encryption with Multi-keyword Search." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35211-9_72.
Full textConference papers on the topic "Public key authenticated encryption with keyword search"
Singh, Akansha, Venkata Bhikshapathi Chenam, and Syed Taqi Ali. "Enhanced provably secure public key encryption with keyword search scheme for secure cloud-based keyword search." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725485.
Full textLiu, Zi-Yuan, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, and Yu-Chi Chen. "Public-key Authenticated Encryption with Keyword Search." In ASIA CCS '22: ACM Asia Conference on Computer and Communications Security. ACM, 2022. http://dx.doi.org/10.1145/3488932.3497760.
Full textChan, Koon-Ming, Swee-Huay Heng, Syh-Yuan Tan, and Shing-Chiang Tan. "K-Resilient Public Key Authenticated Encryption with Keyword Search." In 21st International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2024. http://dx.doi.org/10.5220/0012716100003767.
Full textEmura, Keita. "Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited." In ASIA CCS '22: ACM Asia Conference on Computer and Communications Security. ACM, 2022. http://dx.doi.org/10.1145/3494105.3526237.
Full textWang, Zhaoli, Jinli Han, Meijuan Wang, Yaqing Shi, and Hui Dong. "Public Key Encryption with Wildcards Keyword Search." In 2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC). IEEE, 2018. http://dx.doi.org/10.1109/imccc.2018.00119.
Full textxu, Wujing, Xiaolei Dong, Zhenfu Cao, and Jiachen Shen. "Revocable Public Key Encryption with Authorized Keyword Search." In 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE, 2019. http://dx.doi.org/10.1109/itnec.2019.8729491.
Full textHou, Changjiang, Fei Liu, Hongtao Bai, and Lanfang Ren. "Public-Key Encryption with Keyword Search from Lattice." In 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). IEEE, 2013. http://dx.doi.org/10.1109/3pgcic.2013.57.
Full textHu, Chengyu, and Pengtao Liu. "Public Key Encryption with Ranked Multi-keyword Search." In 2013 International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2013. http://dx.doi.org/10.1109/incos.2013.24.
Full textLuo, Wenjun, and Jianming Tan. "Public key encryption with keyword search based on factoring." In 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE, 2012. http://dx.doi.org/10.1109/ccis.2012.6664583.
Full textGuo Duntao, Huang Dawei, Chen Haibin, and Yang Xiaoyuan. "A new public key encryption with temporary keyword search." In 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE 2010). IEEE, 2010. http://dx.doi.org/10.1109/cmce.2010.5610216.
Full text