2022
DOI: 10.5539/cis.v15n1p66
|View full text |Cite
|
Sign up to set email alerts
|

Dual Fine-Grained Public-Key Searchable Encryption from Lattices

Abstract: Fine-grained public key encryption with keyword search (PEKS), allowing users to search on encrypted data with flexible access control policy, has been widely studied recently due to its promising application to real-world scenarios such as cloud computing. However, most of the existing fine-grained PEKS schemes are either only able to support single access control (e.g., attribute-based access control) or susceptible to being attacked or compromised by quantum computers in or after a short time. In this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…The emergence of AFL has also brought new ideas to industry and academia and has become a turning point in hybrid fuzzy testing technology [4]. Driller, a new hybrid fuzzy test method, was proposed in Reference [5]. Different from the previous hybrid testing, literature [6] uses the fork-server idea of AFL to combine the most efficient fuzz testing technology AFL and symbolic execution technology at that time to achieve efficient automated vulnerability mining of binary files, and Driller lays the development direction of hybrid fuzz testing technology.…”
Section: Introductionmentioning
confidence: 99%
“…The emergence of AFL has also brought new ideas to industry and academia and has become a turning point in hybrid fuzzy testing technology [4]. Driller, a new hybrid fuzzy test method, was proposed in Reference [5]. Different from the previous hybrid testing, literature [6] uses the fork-server idea of AFL to combine the most efficient fuzz testing technology AFL and symbolic execution technology at that time to achieve efficient automated vulnerability mining of binary files, and Driller lays the development direction of hybrid fuzz testing technology.…”
Section: Introductionmentioning
confidence: 99%