Zou, Liping; Feng, Chaosheng; Qin, Zhiguang; Yuan, Ding; Luo, Wangping; Li, Min CP-ABE scheme with fast decryption for public cloud. (Chinese. English summary) Zbl 07267144 J. Softw. 31, No. 6, 1817-1828 (2020). MSC: 68P25 PDF BibTeX XML Cite \textit{L. Zou} et al., J. Softw. 31, No. 6, 1817--1828 (2020; Zbl 07267144) Full Text: DOI
Gong, Linming; Li, Shundong; Dou, Jiawei; Wang, Daoshun Private social-willing detection. (Chinese. English summary) Zbl 1449.68030 J. Softw. 30, No. 11, 3535-3548 (2019). MSC: 68P25 68M12 68P27 PDF BibTeX XML Cite \textit{L. Gong} et al., J. Softw. 30, No. 11, 3535--3548 (2019; Zbl 1449.68030) Full Text: DOI
Zheng, Jingzhu; Yang, Haining; Su, Ye; Qin, Jing A blindly public verifiable outsourcing scheme for matrix multiplication. (Chinese. English summary) Zbl 1449.68042 J. Shandong Univ., Nat. Sci. 54, No. 11, 1-11 (2019). MSC: 68P27 65F99 68M11 PDF BibTeX XML Cite \textit{J. Zheng} et al., J. Shandong Univ., Nat. Sci. 54, No. 11, 1--11 (2019; Zbl 1449.68042) Full Text: DOI
Wang, Tao; Yang, Bo; Liu, Hongyu; Yu, Yong; Qiu, Guoyong; Xia, Zhe An alternative approach to public cloud data auditing supporting data dynamics. (English) Zbl 1418.68078 Soft Comput. 23, No. 13, 4939-4953 (2019). MSC: 68P20 68M11 68M12 94A62 PDF BibTeX XML Cite \textit{T. Wang} et al., Soft Comput. 23, No. 13, 4939--4953 (2019; Zbl 1418.68078) Full Text: DOI
Kopp, Henning; Kargl, Frank; Bösch, Christoph Publicly verifiable static proofs of storage: a novel scheme and efficiency comparisons. (English) Zbl 07297646 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer (ISBN 978-3-030-01949-5/pbk; 978-3-030-01950-1/ebook). Lecture Notes in Computer Science 11149, 459-477 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{H. Kopp} et al., Lect. Notes Comput. Sci. 11149, 459--477 (2018; Zbl 07297646) Full Text: DOI
Liu, Dengzhi; Shen, Jian; Chen, Yuling; Wang, Chen; Zhou, Tianqi; Wang, Anxi Privacy-preserving data outsourcing with integrity auditing for lightweight devices in cloud computing. (English) Zbl 07124881 Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer (ISBN 978-3-030-14233-9/pbk; 978-3-030-14234-6/ebook). Lecture Notes in Computer Science 11449, 223-239 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Liu} et al., Lect. Notes Comput. Sci. 11449, 223--239 (2018; Zbl 07124881) Full Text: DOI
Cash, David; Liu, Feng-Hao; O’Neill, Adam; Zhandry, Mark; Zhang, Cong Parameter-hiding order revealing encryption. (English) Zbl 1440.68055 Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 181-210 (2018). MSC: 68P15 68P25 94A60 PDF BibTeX XML Cite \textit{D. Cash} et al., Lect. Notes Comput. Sci. 11272, 181--210 (2018; Zbl 1440.68055) Full Text: DOI
Liu, Lin; Su, Jinshu; Chen, Rongmao; Liu, Ximeng; Wang, Xiaofeng; Chen, Shuhui; Leung, Hofung Privacy-preserving mining of association rule on outsourced cloud data from multiple parties. (English) Zbl 06944258 Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-93637-6/pbk; 978-3-319-93638-3/ebook). Lecture Notes in Computer Science 10946, 431-451 (2018). MSC: 68P27 PDF BibTeX XML Cite \textit{L. Liu} et al., Lect. Notes Comput. Sci. 10946, 431--451 (2018; Zbl 06944258) Full Text: DOI
Shen, Jian; Liu, Dengzhi; Chen, Xiaofeng; Huang, Xinyi; Chen, Jiageng; Zhang, Mingwu Secure publicly verifiable computation with polynomial commitment in cloud computing. (English) Zbl 06944257 Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-93637-6/pbk; 978-3-319-93638-3/ebook). Lecture Notes in Computer Science 10946, 417-430 (2018). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{J. Shen} et al., Lect. Notes Comput. Sci. 10946, 417--430 (2018; Zbl 06944257) Full Text: DOI
Wang, Yujue; Pang, HweeHwa; Tran, Ngoc Hieu; Deng, Robert H. CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications. (English) Zbl 1435.68081 Inf. Sci. 414, 289-305 (2017). MSC: 68P25 68P27 94A62 PDF BibTeX XML Cite \textit{Y. Wang} et al., Inf. Sci. 414, 289--305 (2017; Zbl 1435.68081) Full Text: DOI
Wang, Hao; He, Debiao; Shen, Jian; Zheng, Zhihua; Zhao, Chuan; Zhao, Minghao Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. (English) Zbl 1381.94089 Soft Comput. 21, No. 24, 7325-7335 (2017). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{H. Wang} et al., Soft Comput. 21, No. 24, 7325--7335 (2017; Zbl 1381.94089) Full Text: DOI
Sun, Jiameng; Zhu, Binrui; Qin, Jing; Hu, Jiankun; Wu, Qianhong Confidentiality-preserving publicly verifiable computation. (English) Zbl 1417.94081 Int. J. Found. Comput. Sci. 28, No. 6, 799-818 (2017). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{J. Sun} et al., Int. J. Found. Comput. Sci. 28, No. 6, 799--818 (2017; Zbl 1417.94081) Full Text: DOI
Ding, Yong; Xu, Zheng; Ye, Jun; Choo, Kim-Kwang Raymond Secure outsourcing of modular exponentiations under single untrusted programme model. (English) Zbl 1374.68067 J. Comput. Syst. Sci. 90, 1-13 (2017). MSC: 68M14 68P25 94A60 PDF BibTeX XML Cite \textit{Y. Ding} et al., J. Comput. Syst. Sci. 90, 1--13 (2017; Zbl 1374.68067) Full Text: DOI
Xiang, Tao; Li, Xiaoguo; Chen, Fei; Guo, Shangwei; Yang, Yuanyuan Processing secure, verifiable and efficient SQL over outsourced database. (English) Zbl 1398.68125 Inf. Sci. 348, 163-178 (2016). MSC: 68P15 68P25 94A62 PDF BibTeX XML Cite \textit{T. Xiang} et al., Inf. Sci. 348, 163--178 (2016; Zbl 1398.68125) Full Text: DOI
Liu, Xuejiao; Xia, Yingjie; Chen, Wenzhi; Xiang, Yang; Hassan, Mohammad Mehedi; Alelaiwi, Abdulhameed SEMD: secure and efficient message dissemination with policy enforcement in VANET. (English) Zbl 1348.68048 J. Comput. Syst. Sci. 82, No. 8, 1316-1328 (2016). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{X. Liu} et al., J. Comput. Syst. Sci. 82, No. 8, 1316--1328 (2016; Zbl 1348.68048) Full Text: DOI
Yavuz, Attila A.; Guajardo, Jorge Dynamic searchable symmetric encryption with minimal leakage and efficient updates on commodity hardware. (English) Zbl 1396.94104 Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 241-259 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{A. A. Yavuz} and \textit{J. Guajardo}, Lect. Notes Comput. Sci. 9566, 241--259 (2016; Zbl 1396.94104) Full Text: DOI
Achenbach, Dirk; Huber, Matthias; Müller-Quade, Jörn; Rill, Jochen Closing the gap: a universal privacy framework for outsourced data. (English) Zbl 1402.94048 Pasalic, Enes (ed.) et al., Cryptography and information security in the Balkans. Second international conference, BalkanCryptSec 2015, Koper, Slovenia, September 3–4, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-29171-0/pbk; 978-3-319-29172-7/ebook). Lecture Notes in Computer Science 9540, 134-151 (2016). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{D. Achenbach} et al., Lect. Notes Comput. Sci. 9540, 134--151 (2016; Zbl 1402.94048) Full Text: DOI
Chen, Yuechen; Jiang, Zoe L.; Yiu, S. M.; Liu, Joseph K.; Au, Man Ho; Wang, Xuan Fully secure ciphertext-policy attribute based encryption with security mediator. (English) Zbl 1351.68092 Hui, K. (ed.) et al., Information and communications security. 16th international conference, ICICS 2014, Hong Kong, China, December 16–17, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-21965-3/pbk; 978-3-319-21966-0/ebook). Lecture Notes in Computer Science 8958, 274-289 (2015). MSC: 68P25 PDF BibTeX XML Cite \textit{Y. Chen} et al., Lect. Notes Comput. Sci. 8958, 274--289 (2015; Zbl 1351.68092) Full Text: DOI
Li, Jin; Chen, Xiaofeng; Xhafa, Fatos; Barolli, Leonard Secure deduplication storage systems supporting keyword search. (English) Zbl 1328.68056 J. Comput. Syst. Sci. 81, No. 8, 1532-1541 (2015). MSC: 68P20 68M14 68P25 94A62 PDF BibTeX XML Cite \textit{J. Li} et al., J. Comput. Syst. Sci. 81, No. 8, 1532--1541 (2015; Zbl 1328.68056) Full Text: DOI
Zhang, Fangguo; Ma, Xu; Liu, Shengli Efficient computation outsourcing for inverting a class of homomorphic functions. (English) Zbl 1355.68079 Inf. Sci. 286, 19-28 (2014). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{F. Zhang} et al., Inf. Sci. 286, 19--28 (2014; Zbl 1355.68079) Full Text: DOI
Emekci, Fatih; Methwally, Ahmed; Agrawal, Divyakant; El Abbadi, Amr Dividing secrets to secure data outsourcing. (English) Zbl 1328.68050 Inf. Sci. 263, 198-210 (2014). MSC: 68P15 68P25 PDF BibTeX XML Cite \textit{F. Emekci} et al., Inf. Sci. 263, 198--210 (2014; Zbl 1328.68050) Full Text: DOI
De Capitani di Vimercati, Sabrina; Foresti, Sara; Jajodia, Sushil; Livraga, Giovanni Enforcing subscription-based authorization policies in cloud scenarios. (English) Zbl 1329.68097 Cuppens-Boulahia, Nora (ed.) et al., Data and applications security and privacy XXVI. 26th annual IFIP WG 11.3 conference, DBSec 2012, Paris, France, July 11–13, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31539-8/pbk). Lecture Notes in Computer Science 7371, 314-329 (2012). MSC: 68P25 PDF BibTeX XML Cite \textit{S. De Capitani di Vimercati} et al., Lect. Notes Comput. Sci. 7371, 314--329 (2012; Zbl 1329.68097) Full Text: DOI
Chung, Kai-Min; Kalai, Yael; Vadhan, Salil Improved delegation of computation using fully homomorphic encryption. (English) Zbl 1284.68063 Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 483-501 (2010). MSC: 68M12 68P25 94A62 PDF BibTeX XML Cite \textit{K.-M. Chung} et al., Lect. Notes Comput. Sci. 6223, 483--501 (2010; Zbl 1284.68063) Full Text: DOI