Identity-based encryption with authorized equivalence test for cloud-assisted IoT (original) (raw)
References
Fang, X., Misra, S., Xue, G., Yang, D.: Smart grid the new and improved grid: a survey. IEEE Commun. Surv. Tutor. 14(4), 944–980 (2012) Article Google Scholar
Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J. Syst. Archit. 98, 165–172 (2019) Article Google Scholar
Galloway, B., Hancke, G.P.: Introduction to industrial control networks. IEEE Commun. Surv. Tutor. 15(2), 860–880 (2013) Article Google Scholar
Toor, Y., Muhlethaler, P., Laouiti, A., De La Fortelle, A.: Vehicle ad hoc networks: applications and related technical issues. IEEE Commun. Surv. Tutor. 10(3), 74–88 (2008) Article Google Scholar
Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., Shen, X.S.: Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122–129 (2017) Article Google Scholar
Elhabob, R., Sella, I., Zhao, Y., Zhu, G., Xiong, H.: A heterogeneous systems public key encryption with equality test in smart city. In: Proceedings of The 18th International Conference on Electronic Business. ICEB, Guilin(2018)
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010) Article Google Scholar
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (iot): a vision, architectural elements, and future directions. Fut. Gener. Comput. Syst. 29(7), 1645–1660 (2013) Article Google Scholar
Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15(2), 843–859 (2013) Article Google Scholar
Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges. IEEE Commun. Mag. 55(1), 26–33 (2017) Article Google Scholar
Miloslavskaya, N., Tolstoy, A.: Internet of things: information security challenges and solutions. Clust. Comput. 22, 103–119 (2019) Article Google Scholar
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522. Springer, Berlin (2004)
Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In Cryptographers Track at the RSA Conference, pp. 119–131. Springer, Berlin (2010)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 47–53. Springer, Berlin (1984)
Li, H., Huang, Q., Ma, S., Shen, J., Susilo, W.: Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access 7, 25409–25421 (2019) Article Google Scholar
Xiong, H., Bao, Y., Nie, X., Assor, Y.I.: Server-aided attribute-based signature supporting expressive access structures for industrial internet of things. IEEE Trans. Ind. Inf. (2019). https://doi.org/10.1109/TII.2018.2813304 Article Google Scholar
Song, Dawn Xiaoding, Wagner, David, Perrig, Adrian: Practical techniques for searches on encrypted data. In: Proceedings 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp. 44–55. IEEE (2000)
Zhang, J., Mao, J.: Efficient public key encryption with revocable keyword search in cloud computing. Clust. Comput. 19(3), 1211–1217 (2016) Article Google Scholar
Lu, Y., Li, J.: Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems. Clust. Comput. 22, 285–299 (2019) Article Google Scholar
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. J. Cryptol. 21(3), 350–391 (2008) ArticleMathSciNet Google Scholar
Tang, Q.: Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Australasian Conference on Information Security and Privacy, pp. 389–406. Springer, Berlin (2011)
Tang, Q.: Public key encryption schemes supporting equality test with authorisation of different granularity. Int. J. Appl. Cryptogr. 2(4), 304–321 (2012) ArticleMathSciNet Google Scholar
Tang, Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351–1362 (2012) Article Google Scholar
Ma, S., Zhang, M., Huang, Q., Yang, B.: Public key encryption with delegated equality test in a multi-user setting. Comput. J. 58(4), 986–1002 (2015) Article Google Scholar
Huang, K., Tso, R., Chen, Y.-C., Mizanur, S.M., Rahman, A.A., Alamri, A.: Pke-aet: public key encryption with authorized equality test. Comput. J. 58(10), 2686–2697 (2015) Article Google Scholar
Yan, X., Wang, M., Zhong, H., Cui, J., Liu, L., Franqueira, V.N.L.: Verifiable public key encryption scheme with equality test in 5g networks. IEEE Access 5, 12702–12713 (2017) Article Google Scholar
Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389–402 (2016) Article Google Scholar
Lee, H.T., Ling, S., Seo, J.H., Wang, H.: Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf. Sci. 373, 419–440 (2016) Article Google Scholar
Libing, W., Zhang, Y., Choo, K.-K.R., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Fut. Gener. Comput. Syst. 73, 22–31 (2017) Article Google Scholar
Libing, W., Zhang, Y., Choo, K.-K.R., He, D.: Efficient identity-based encryption scheme with equality test in smart city. IEEE Trans. Sustain. Comput. 3(1), 44–55 (2018) Article Google Scholar
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer, Berlin (2001)
Lynn, B., et al.: The Stanford pairing based crypto library. http://crypto.stanford.edu/pbc/ (2006). Accessed 27, March 2013