Secure key-aggregation authorized searchable encryption

This is a preview of subscription content, access via your institution.

References

  1. 1

    Liang J, Han W L, Guo Z Q, et al. DESC: enabling secure data exchange based on smart contracts. Sci China Inf Sci, 2018, 61: 049102

    Google Scholar 

  2. 2

    Bao F, Deng R H, Ding X H, et al. Private query on encrypted data in multi-user settings. In: Proceedings of International Conference on Information Security Practice and Experience. Berlin: Springer, 2008. 71–85

    Google Scholar 

  3. 3

    Dong C Y, Russello G, Dulay N. Shared and searchable encrypted data for untrusted servers. J Comput Secur, 2011, 19: 367–397

    Article  Google Scholar 

  4. 4

    Li M, Yu S C, Cao N, et al. Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS), 2011. 383–392

    Google Scholar 

  5. 5

    Shi J, Lai J Z, Li Y J, et al. Authorized keyword search on encrypted data. In: Proceedings of European Symposium on Research in Computer Security. Berlin: Springer, 2014. 419–435

    Google Scholar 

  6. 6

    Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Advances in Cryptology—CRYPTO. Berlin: Springer, 2005. 3621: 258–275

    Google Scholar 

  7. 7

    Cui B J, Liu Z L, Wang L Y. Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage. IEEE Trans Comput, 2016, 65: 2374–2385

    MathSciNet  Article  MATH  Google Scholar 

Download references

Acknowledgements

This work was supported in part by National Natural Science Foundation of China (Grant Nos. 61632012, 61672239), in part by Shanghai High-Tech Field Project (Grant No. 16511101400), and in part by Fundamental Research Funds for the Central Universities.

Author information

Affiliations

Authors

Corresponding authors

Correspondence to Xiaolei Dong or Zhenfu Cao.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Wang, H., Dong, X., Cao, Z. et al. Secure key-aggregation authorized searchable encryption. Sci. China Inf. Sci. 62, 39111 (2019). https://doi.org/10.1007/s11432-017-9508-3

Download citation