Shen, Xiaoying; Wang, Baocang; Wang, Licheng; Duan, Pu; Zhang, Benyu Group public key encryption supporting equality test without bilinear pairings. (English) Zbl 07814680 Inf. Sci. 605, 202-224 (2022). MSC: 68-XX 94-XX PDFBibTeX XMLCite \textit{X. Shen} et al., Inf. Sci. 605, 202--224 (2022; Zbl 07814680) Full Text: DOI
Li, Ni; Chen, Zhenhua; Nie, Jingjing; Fu, Xingbing; Jia, Xingxing Complementary set encryption for privacy-preserving data consolidation. (English) Zbl 07800156 Inf. Sci. 593, 271-288 (2022). MSC: 68P25 68P27 94A60 PDFBibTeX XMLCite \textit{N. Li} et al., Inf. Sci. 593, 271--288 (2022; Zbl 07800156) Full Text: DOI
Qin, Baodong; Chen, Yu; Huang, Qiong; Liu, Ximeng; Zheng, Dong Public-key authenticated encryption with keyword search revisited: security model and constructions. (English) Zbl 1457.68085 Inf. Sci. 516, 515-528 (2020). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{B. Qin} et al., Inf. Sci. 516, 515--528 (2020; Zbl 1457.68085) Full Text: DOI
Lee, Hyung Tae; Ling, San; Seo, Jae Hong; Wang, Huaxiong; Youn, Taek-Young Public key encryption with equality test in the standard model. (English) Zbl 1457.94158 Inf. Sci. 516, 89-108 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{H. T. Lee} et al., Inf. Sci. 516, 89--108 (2020; Zbl 1457.94158) Full Text: DOI
Ling, Yunhao; Ma, Sha; Huang, Qiong; Li, Ximing; Ling, Yunzhi Group public key encryption with equality test against offline message recovery attack. (English) Zbl 1456.94097 Inf. Sci. 510, 16-32 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Ling} et al., Inf. Sci. 510, 16--32 (2020; Zbl 1456.94097) Full Text: DOI
Lee, Hyung Tae; Ling, San; Seo, Jae Hong; Wang, Huaxiong Public key encryption with equality test from generic assumptions in the random oracle model. (English) Zbl 1451.94029 Inf. Sci. 500, 15-33 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{H. T. Lee} et al., Inf. Sci. 500, 15--33 (2019; Zbl 1451.94029) Full Text: DOI Link
Qu, Haipeng; Yan, Zhen; Lin, Xi-Jun; Zhang, Qi; Sun, Lin Certificateless public key encryption with equality test. (English) Zbl 1440.94075 Inf. Sci. 462, 76-92 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{H. Qu} et al., Inf. Sci. 462, 76--92 (2018; Zbl 1440.94075) Full Text: DOI
Lin, Xi-Jun; Sun, Lin; Qu, Haipeng Generic construction of public key encryption, identity-based encryption and signcryption with equality test. (English) Zbl 1446.94150 Inf. Sci. 453, 111-126 (2018). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{X.-J. Lin} et al., Inf. Sci. 453, 111--126 (2018; Zbl 1446.94150) Full Text: DOI
Huang, Zhengan; Liu, Shengli; Mao, Xianping; Chen, Kefei; Li, Jin Insight of the protection for data security under selective opening attacks. (English) Zbl 1435.68079 Inf. Sci. 412-413, 223-241 (2017). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{Z. Huang} et al., Inf. Sci. 412--413, 223--241 (2017; Zbl 1435.68079) Full Text: DOI
Huang, Qiong; Li, Hongbo An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. (English) Zbl 1429.68061 Inf. Sci. 403-404, 1-14 (2017). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{Q. Huang} and \textit{H. Li}, Inf. Sci. 403--404, 1--14 (2017; Zbl 1429.68061) Full Text: DOI
Lee, Hyung Tae; Ling, San; Seo, Jae Hong; Wang, Huaxiong Semi-generic construction of public key encryption and identity-based encryption with equality test. (English) Zbl 1429.68063 Inf. Sci. 373, 419-440 (2016). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{H. T. Lee} et al., Inf. Sci. 373, 419--440 (2016; Zbl 1429.68063) Full Text: DOI Link
Lu, Yang; Li, Jiguo A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model. (English) Zbl 1428.94088 Inf. Sci. 372, 745-757 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Lu} and \textit{J. Li}, Inf. Sci. 372, 745--757 (2016; Zbl 1428.94088) Full Text: DOI
Ma, Sha Identity-based encryption with outsourced equality test in cloud computing. (English) Zbl 1390.68278 Inf. Sci. 328, 389-402 (2016). MSC: 94A60 68P25 68M11 PDFBibTeX XMLCite \textit{S. Ma}, Inf. Sci. 328, 389--402 (2016; Zbl 1390.68278) Full Text: DOI
Fang, Liming; Susilo, Willy; Ge, Chunpeng; Wang, Jiandong Public key encryption with keyword search secure against keyword guessing attacks without random oracle. (English) Zbl 1321.94057 Inf. Sci. 238, 221-241 (2013). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{L. Fang} et al., Inf. Sci. 238, 221--241 (2013; Zbl 1321.94057) Full Text: DOI Link
Rhee, Hyun Sook; Park, Jong Hwan; Lee, Dong Hoon Generic construction of designated tester public-key encryption with keyword search. (English) Zbl 1250.94043 Inf. Sci. 205, 93-109 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{H. S. Rhee} et al., Inf. Sci. 205, 93--109 (2012; Zbl 1250.94043) Full Text: DOI
Qin, Bo; Wu, Qianhong; Zhang, Lei; Farràs, Oriol; Domingo-Ferrer, Josep Provably secure threshold public-key encryption with adaptive security and short ciphertexts. (English) Zbl 1250.94042 Inf. Sci. 210, 67-80 (2012). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{B. Qin} et al., Inf. Sci. 210, 67--80 (2012; Zbl 1250.94042) Full Text: DOI
Lai, Junzuo; Kou, Weidong; Chen, Kefei Self-generated-certificate public key encryption without pairing and its application. (English) Zbl 1218.68079 Inf. Sci. 181, No. 11, 2422-2435 (2011). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{J. Lai} et al., Inf. Sci. 181, No. 11, 2422--2435 (2011; Zbl 1218.68079) Full Text: DOI
Xu, Peng; Cui, Guo-Hua; Lei, Feng-Yu; Xu, Jing-Fang One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity. (English) Zbl 1206.94098 Inf. Sci. 180, No. 22, 4420-4429 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Xu} et al., Inf. Sci. 180, No. 22, 4420--4429 (2010; Zbl 1206.94098) Full Text: DOI
Shao, Jun; Cao, Zhenfu; Liang, Xiaohui; Lin, Huang Proxy re-encryption with keyword search. (English) Zbl 1191.94100 Inf. Sci. 180, No. 13, 2576-2587 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Shao} et al., Inf. Sci. 180, No. 13, 2576--2587 (2010; Zbl 1191.94100) Full Text: DOI
Li, Chung Ki; Wong, Duncan S. Signcryption from randomness recoverable public key encryption. (English) Zbl 1191.94093 Inf. Sci. 180, No. 4, 549-559 (2010). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C. K. Li} and \textit{D. S. Wong}, Inf. Sci. 180, No. 4, 549--559 (2010; Zbl 1191.94093) Full Text: DOI
Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo The ring authenticated encryption scheme-how to provide a clue wisely. (English) Zbl 1156.94418 Inf. Sci. 179, No. 1-2, 161-168 (2009). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J. Lv} et al., Inf. Sci. 179, No. 1--2, 161--168 (2009; Zbl 1156.94418) Full Text: DOI
Wu, Tzong-Sun; Hsu, Chien-Lung; Tsai, Kuo-Yu; Lin, Han-Yu; Wu, Tzong-Chen Convertible multi-authenticated encryption scheme. (English) Zbl 1134.94370 Inf. Sci. 178, No. 1, 256-263 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{T.-S. Wu} et al., Inf. Sci. 178, No. 1, 256--263 (2008; Zbl 1134.94370) Full Text: DOI
Long, Yu; Chen, Kefei Certificateless threshold cryptosystem secure against chosen-ciphertext attack. (English) Zbl 1125.94024 Inf. Sci. 177, No. 24, 5620-5637 (2007). MSC: 94A60 68M10 68P25 PDFBibTeX XMLCite \textit{Y. Long} and \textit{K. Chen}, Inf. Sci. 177, No. 24, 5620--5637 (2007; Zbl 1125.94024) Full Text: DOI