Journal articles on the topic 'Public key authenticated encryption with keyword search'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Public key authenticated encryption with keyword search.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Noroozi, Mahnaz, and Ziba Eslami. "Public key authenticated encryption with keyword search: revisited." IET Information Security 13, no. 4 (2019): 336–42. http://dx.doi.org/10.1049/iet-ifs.2018.5315.
Full textLu, Jingwei, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, and Qiong Huang. "Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security." Information 14, no. 3 (2023): 142. http://dx.doi.org/10.3390/info14030142.
Full textDu, Haorui, Jianhua Chen, Ming Chen, Cong Peng, and Debiao He. "A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing." Wireless Communications and Mobile Computing 2022 (October 19, 2022): 1–15. http://dx.doi.org/10.1155/2022/2336685.
Full textDu, Haorui, Jianhua Chen, Fei Lin, Cong Peng, and Debiao He. "A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing." Security and Communication Networks 2022 (October 15, 2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.
Full textQin, Baodong, Yu Chen, Qiong Huang, Ximeng Liu, and Dong Zheng. "Public-key authenticated encryption with keyword search revisited: Security model and constructions." Information Sciences 516 (April 2020): 515–28. http://dx.doi.org/10.1016/j.ins.2019.12.063.
Full textFan, Yajun, Baodong Qin, and Dong Zheng. "A lattice-based designated-server public-key authenticated encryption with keyword search." Journal of Systems Architecture 145 (December 2023): 103031. http://dx.doi.org/10.1016/j.sysarc.2023.103031.
Full textChi, Tianyu, Baodong Qin, and Dong Zheng. "An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things." Wireless Communications and Mobile Computing 2020 (July 14, 2020): 1–11. http://dx.doi.org/10.1155/2020/8816172.
Full textHe, Debiao, Mimi Ma, Sherali Zeadally, Neeraj Kumar, and Kaitai Liang. "Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things." IEEE Transactions on Industrial Informatics 14, no. 8 (2018): 3618–27. http://dx.doi.org/10.1109/tii.2017.2771382.
Full textEmura, Keita. "Generic Construction of Fully Anonymous Broadcast Authenticated Encryption with Keyword Search with Adaptive Corruptions." IET Information Security 2023 (November 7, 2023): 1–12. http://dx.doi.org/10.1049/2023/9922828.
Full textMa, Yang, and Hassan Kazemian. "Public key authenticated encryption with multiple keywords search using Mamdani system." Evolving Systems 12, no. 3 (2021): 687–99. http://dx.doi.org/10.1007/s12530-021-09387-0.
Full textPan, Xiangyu, and Fagen Li. "Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability." Journal of Systems Architecture 115 (May 2021): 102075. http://dx.doi.org/10.1016/j.sysarc.2021.102075.
Full textHan, Lidong, Junling Guo, Guang Yang, Qi Xie, and Chengliang Tian. "An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time." IEEE Access 9 (2021): 151245–53. http://dx.doi.org/10.1109/access.2021.3126867.
Full textMa, Yang, and Hassan Kazemian. "A Secure and Efficient Public Key Authenticated Encryption with Multi-keywords Search Scheme against Inside Keyword Guessing Attack." International Journal of Cyber-Security and Digital Forensics 9, no. 2 (2020): 90–101. http://dx.doi.org/10.17781/p002654.
Full textChenam, Venkata Bhikshapathi, and Syed Taqi Ali. "A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA." Computer Standards & Interfaces 81 (April 2022): 103603. http://dx.doi.org/10.1016/j.csi.2021.103603.
Full textCheng, Leixiao, and Fei Meng. "Security analysis of Pan et al.’s “Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability”." Journal of Systems Architecture 119 (October 2021): 102248. http://dx.doi.org/10.1016/j.sysarc.2021.102248.
Full textZHANG, Rui, and Hideki IMAI. "Combining Public Key Encryption with Keyword Search and Public Key Encryption." IEICE Transactions on Information and Systems E92-D, no. 5 (2009): 888–96. http://dx.doi.org/10.1587/transinf.e92.d.888.
Full textSoroush, A. M. "PUBLIC KEY ENCRYPTION SCHEME BASED ON KEYWORD SEARCH." Open Journal of Physical Science (ISSN: 2734-2123) 4, no. 1 (2023): 34–53. http://dx.doi.org/10.52417/ojps.v4i1.471.
Full textMORGAN, B., M. HAMADA, and G. ABDEFADEL. "EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH." JES. Journal of Engineering Sciences 38, no. 3 (2010): 749–61. http://dx.doi.org/10.21608/jesaun.2010.124396.
Full textYanguo, Peng, Cui Jiangtao, Peng Changgen, and Ying Zuobin. "Certificateless public key encryption with keyword search." China Communications 11, no. 11 (2014): 100–113. http://dx.doi.org/10.1109/cc.2014.7004528.
Full textSaraswat, Vishal, Rajeev Anand Sahu, Gaurav Sharma, Veronika Kuchta, and Olivier Markowitch. "Public-Key Encryption with Integrated Keyword Search." Journal of Hardware and Systems Security 3, no. 1 (2019): 12–25. http://dx.doi.org/10.1007/s41635-019-00066-w.
Full textManoj, Sharma, and Gupta Akshay. "Public Key Encryption and Keyword Search Mapping." Applied Science and Biotechnology Journal for Advanced Research 3, no. 1 (2024): 12–15. https://doi.org/10.5281/zenodo.10656146.
Full textALI, FAIROUZ SHER, and SONG FENG LU. "PUBLIC KEY ENCRYPTION WITH CONJUNCTIVE FIELD FREE KEYWORD SEARCH SCHEME." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 14 (2016): 7423–34. http://dx.doi.org/10.24297/ijct.v15i14.834.
Full textZhang, Yu, Lei You, and Yin Li. "Tree-Based Public Key Encryption with Conjunctive Keyword Search." Security and Communication Networks 2021 (November 5, 2021): 1–16. http://dx.doi.org/10.1155/2021/7034944.
Full textZhou, Yunhong, Na Li, Yanmei Tian, Dezhi An, and Licheng Wang. "Public Key Encryption with Keyword Search in Cloud: A Survey." Entropy 22, no. 4 (2020): 421. http://dx.doi.org/10.3390/e22040421.
Full textYoon, Hyundo, and Junbeom Hur. "SGX-Based Public Key Encryption with Keyword Search." Journal of Korean Institute of Communications and Information Sciences 46, no. 5 (2021): 777–87. http://dx.doi.org/10.7840/kics.2021.46.5.777.
Full textLiming Fang, Jiandong Wang, Chunpeng Ge, and Yongjun Ren. "Decryptable Public Key Encryption with Keyword Search Schemes." International Journal of Digital Content Technology and its Applications 4, no. 9 (2010): 141–50. http://dx.doi.org/10.4156/jdcta.vol4.issue9.17.
Full textChen, Rongmao, Yi Mu, Guomin Yang, et al. "Server-Aided Public Key Encryption With Keyword Search." IEEE Transactions on Information Forensics and Security 11, no. 12 (2016): 2833–42. http://dx.doi.org/10.1109/tifs.2016.2599293.
Full textHu, Chengyu, Pengtao Liu, Rupeng Yang, and Yan Xu. "Public-Key Encryption With Keyword Search via Obfuscation." IEEE Access 7 (2019): 37394–405. http://dx.doi.org/10.1109/access.2019.2905250.
Full textYu, Yong, Jianbing Ni, Haomiao Yang, Yi Mu, and Willy Susilo. "Efficient public key encryption with revocable keyword search." Security and Communication Networks 7, no. 2 (2013): 466–72. http://dx.doi.org/10.1002/sec.790.
Full textZhou, Yunhong, Shihui Zheng, and Licheng Wang. "Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud." Cryptography 4, no. 4 (2020): 28. http://dx.doi.org/10.3390/cryptography4040028.
Full textYang, Xiaodong, Guilan Chen, Meiding Wang, Ting Li, and Caifen Wang. "Multi-Keyword Certificateless Searchable Public Key Authenticated Encryption Scheme Based on Blockchain." IEEE Access 8 (2020): 158765–77. http://dx.doi.org/10.1109/access.2020.3020841.
Full textMamta, Brij B. Gupta, and Syed Taqi Ali. "ISEkFT." Journal of Information Technology Research 12, no. 3 (2019): 133–53. http://dx.doi.org/10.4018/jitr.2019070108.
Full textMeng, Xian Yong, Zhong Chen, and Xiang Yu Meng. "A Novel Proxy Re-Encryption with Keyword Search." Applied Mechanics and Materials 631-632 (September 2014): 897–901. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.897.
Full textZhang, Yu, Yin Li, and Yifan Wang. "Conjunctive and Disjunctive Keyword Search over Encrypted Mobile Cloud Data in Public Key System." Mobile Information Systems 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3839254.
Full textZhu, Binrui, Jiameng Sun, Jing Qin, and Jixin Ma. "A Secure Data Sharing Scheme with Designated Server." Security and Communication Networks 2019 (June 27, 2019): 1–16. http://dx.doi.org/10.1155/2019/4268731.
Full textYin, Shoulin, Lin Teng, and Jie Liu. "Distributed Searchable Asymmetric Encryption." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 3 (2016): 684. http://dx.doi.org/10.11591/ijeecs.v4.i3.pp684-694.
Full textVaanchig, Nyamsuren, and Zhiguang Qin. "Public key encryption with temporary and fuzzy keyword search." Mathematical Biosciences and Engineering 16, no. 5 (2019): 3914–35. http://dx.doi.org/10.3934/mbe.2019193.
Full textWang, Peng, Tao Xiang, Xiaoguo Li, and Hong Xiang. "Public key encryption with conjunctive keyword search on lattice." Journal of Information Security and Applications 51 (April 2020): 102433. http://dx.doi.org/10.1016/j.jisa.2019.102433.
Full textJiang, Zike, and Shixin Chen. "Dual Fine-Grained Public-Key Searchable Encryption from Lattices." Computer and Information Science 15, no. 1 (2022): 66. http://dx.doi.org/10.5539/cis.v15n1p66.
Full textHwang, Min-Shiang, Cheng-Chi Lee, and Shih-Ting Hsu. "An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme." International Journal of Foundations of Computer Science 30, no. 02 (2019): 255–73. http://dx.doi.org/10.1142/s0129054119500047.
Full textTrinh, Van Anh, and Viet Cuong Trinh. "A CIPHERTEXT-POLICY ATTRIBUTE-BASED SEARCHABLE ENCRYPTION SCHEME IN NON-INTERACTIVE MODEL." Journal of Computer Science and Cybernetics 35, no. 3 (2019): 233–49. http://dx.doi.org/10.15625/1813-9663/0/0/13667.
Full textTrinh, Van Anh, and Viet Cuong Trinh. "A CIPHERTEXT-POLICY ATTRIBUTE-BASED SEARCHABLE ENCRYPTION SCHEME IN NON-INTERACTIVE MODEL." Journal of Computer Science and Cybernetics 35, no. 3 (2019): 233–49. http://dx.doi.org/10.15625/1813-9663/35/3/13667.
Full textMa, Sha, and Qiong Huang. "A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search." Computer Journal 63, no. 12 (2020): 1849–58. http://dx.doi.org/10.1093/comjnl/bxaa014.
Full textNoroozi, Mahnaz, Ziba Eslami, and Nasrollah Pakniat. "Comments on a chaos-based public key encryption with keyword search scheme." Nonlinear Dynamics 94, no. 2 (2018): 1127–32. https://doi.org/10.1007/s11071-018-4413-9.
Full textSher, Fairouz. "Public Key Encryption with ’Fixed and Short Length’ Keyword Search." International Journal of Computer Applications 154, no. 4 (2016): 1–8. http://dx.doi.org/10.5120/ijca2016912086.
Full textLu, Yang, and Ji-guo Li. "Constructing pairing-free certificateless public key encryption with keyword search." Frontiers of Information Technology & Electronic Engineering 20, no. 8 (2019): 1049–60. http://dx.doi.org/10.1631/fitee.1700534.
Full textSook Rhee, Hyun. "Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search." Computers, Materials & Continua 73, no. 1 (2022): 69–85. http://dx.doi.org/10.32604/cmc.2022.026751.
Full textWu, Tsu-Yang, Chien-Ming Chen, King-Hang Wang, Chao Meng, and Eric Ke Wang. "A provably secure certificateless public key encryption with keyword search." Journal of the Chinese Institute of Engineers 42, no. 1 (2019): 20–28. http://dx.doi.org/10.1080/02533839.2018.1537807.
Full textChen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing, and Shengling Geng. "Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing." Security and Communication Networks 2021 (January 20, 2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.
Full textZhang, Yu, Wei He, and Yin Li. "Efficient Boolean Keywords Search over Encrypted Cloud Data in Public Key Setting." Mobile Information Systems 2020 (August 26, 2020): 1–15. http://dx.doi.org/10.1155/2020/2904861.
Full text