A New Algorithm to Generate The Integrated Access Trees For A Document Collection
Abstract
References
J. Bethencourt, A. Sahai, and B.Waters, ``Ciphertext-policy attribute-based encryption,'' in Proc. IEEE Symp. Secur. Privacy, May 2007, pp. 321_334.
D. Boneh and B. Waters, ``Conjunctive, subset, and range queries on encrypted data,'' in Proc. TCC, 2007, pp. 535_554.
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, ``Privacy-preserving multi-keyword ranked search over encrypted cloud data,'' IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222_233, Jan. 2014.
A. D. Caro and V. Iovino, ``jPBC: Java pairing based cryptography,'' in Proc. IEEE Symp. Comput. Commun. IEEE Comput. Soc., Jun. 2011, pp. 850_855.
C. Chen et al., ``An ef_cient privacy-preserving ranked keyword search method,'' IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 4, pp. 951_963, Apr. 2016.
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, ``Searchable symmet-ric encryption: Improved de_nitions and ef_cient constructions,'' in Proc. ACM CCS, 2006, pp. 79_88.
H. Deng et al., ``Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts,'' Inf. Sci., vol. 275, pp. 370_384, Aug. 2014.
Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, ``Enabling personalized search over encrypted outsourced data with ef_ciency improvement,'' IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 9, pp. 2546_2559, Sep. 2016.
P. Golle, J. Staddon, and B. Waters, ``Secure conjunctive keyword search over encrypted data,'' in Proc. ACNS, 2004, pp. 31_45.
V. Goyal, A. Jain, O. Pandey, and A. Sahai, ``Bounded ciphertext policy attribute based encryption,'' in Automata, Languages and Programming. Berlin, Germany: Springer, 2008, pp. 579_591.
V. Goyal, O. Pandey, A. Sahai, and B.Waters, ``Attribute-based encryption for _ne-grained access control of encrypted data,'' in Proc. 13th ACMConf. Comput. Commun. Secur., 2006, pp. 89_98.
J. Han, W. Susilo, Y. Mu, and J. Yan, ``Privacy-preserving decentralized key-policy attribute-based encryption,'' IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 11, pp. 2150_2162, Nov. 2012.
J. Lai, R. H. Deng, C. Guan, and J.Weng, ``Attribute-based encryption with veri_able outsourced decryption,'' IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343_1354, Aug. 2013.
A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B.Waters, ``Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption,'' in Proc. EUROCRYPT, 2010, pp. 62_91.
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, ``Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption,'' in Proc. Int. Conf. Theory Appl. Cryptograph. Techn. Berlin, Germany: Springer-Verlag, 2010, pp. 62_91.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â