Advertisement

Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Secure key-aggregation authorized searchable encryption

This is a preview of subscription content, log in to check access.

References

  1. 1

    Liang J, Han W L, Guo Z Q, et al. DESC: enabling secure data exchange based on smart contracts. Sci China Inf Sci, 2018, 61: 049102

  2. 2

    Bao F, Deng R H, Ding X H, et al. Private query on encrypted data in multi-user settings. In: Proceedings of International Conference on Information Security Practice and Experience. Berlin: Springer, 2008. 71–85

  3. 3

    Dong C Y, Russello G, Dulay N. Shared and searchable encrypted data for untrusted servers. J Comput Secur, 2011, 19: 367–397

  4. 4

    Li M, Yu S C, Cao N, et al. Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS), 2011. 383–392

  5. 5

    Shi J, Lai J Z, Li Y J, et al. Authorized keyword search on encrypted data. In: Proceedings of European Symposium on Research in Computer Security. Berlin: Springer, 2014. 419–435

  6. 6

    Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Advances in Cryptology—CRYPTO. Berlin: Springer, 2005. 3621: 258–275

  7. 7

    Cui B J, Liu Z L, Wang L Y. Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage. IEEE Trans Comput, 2016, 65: 2374–2385

Download references

Acknowledgements

This work was supported in part by National Natural Science Foundation of China (Grant Nos. 61632012, 61672239), in part by Shanghai High-Tech Field Project (Grant No. 16511101400), and in part by Fundamental Research Funds for the Central Universities.

Author information

Correspondence to Xiaolei Dong or Zhenfu Cao.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Wang, H., Dong, X., Cao, Z. et al. Secure key-aggregation authorized searchable encryption. Sci. China Inf. Sci. 62, 39111 (2019). https://doi.org/10.1007/s11432-017-9508-3

Download citation