2016
DOI: 10.1016/j.ins.2015.08.053
|View full text |Cite
|
Sign up to set email alerts
|

Identity-based encryption with outsourced equality test in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
160
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 163 publications
(160 citation statements)
references
References 18 publications
0
160
0
Order By: Relevance
“…Based on the works of Boneh et al and Menezes et al, the required computational time sequence of different operations is T H ≈ T M < T J < T R < T E ≤ T Q < T P . Thus, the scheme is efficient than others during the key extraction and encryption and better than schemes in other works and nearly equal to Cocks's scheme during decryption of a message. On the other side, in QRDVS scheme, the computation time for a given input message mainly depends on the time required to generate and verify the signature.…”
Section: Further Discussion On the Qribe And Qrdvs Schemesmentioning
confidence: 99%
“…Based on the works of Boneh et al and Menezes et al, the required computational time sequence of different operations is T H ≈ T M < T J < T R < T E ≤ T Q < T P . Thus, the scheme is efficient than others during the key extraction and encryption and better than schemes in other works and nearly equal to Cocks's scheme during decryption of a message. On the other side, in QRDVS scheme, the computation time for a given input message mainly depends on the time required to generate and verify the signature.…”
Section: Further Discussion On the Qribe And Qrdvs Schemesmentioning
confidence: 99%
“…Their work achieves the security against the One-way Chosen Ciphertext Attack (OW-CCA). There are some extensions of PKEET which offer the fine or flexible grain authorization and stronger security [13,12,6,9,10,8]. To achieve the stronger security, the authorization mechanism is adopted to these PKEET schemes.…”
Section: Related Workmentioning
confidence: 99%
“…In [10], Ma et al provided a solution to the PKEET in multi-user setting by delegating the equality test to a fully trusted proxy. Later, Ma [8] proposed an identity-based PKEET (IBEET). These works improved the security of PKEET to IND-CCA security, while private keys are kept secret.…”
Section: Related Workmentioning
confidence: 99%
“…In 2016, S. Ma [13] has presented a new tool for cryptography known as an Identity based Encryption with equality test. In this paper, in opposition to a selected identity attack, a one-way chosen cipher text security has been defined.…”
Section: Existing Workmentioning
confidence: 99%