Skip to main content

Advertisement

Log in

IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services

  • Letter
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. He D B, Kumar N, Zeadally S, Wang H Q. Certificateless provable data possession scheme for cloud-based smart grid data management systems. IEEE Transactions on Information Forensics and Security, 2018, 14(3): 1232–1241

    Google Scholar 

  2. He D B, Zeadally S, Wu L B. Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal, 2018, 12(1): 64–73

    Article  Google Scholar 

  3. Ma S. Identity-based encryption with outsourced equality test in cloud computing. Information Sciences An International Journal, 2016, 328: 389–402

    Article  MATH  Google Scholar 

  4. Yang G M, Tan C H, Huang Q, Wong D S. Probabilistic public key encryption with equality test. In: Proceedings of International Conference on Topics in Cryptology. 2010, 119–131

  5. Jin W B, Rhee H S, Park H A, Dong H L. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Lecture Notes in Computer Science, 2006, 1: 75–83

    Google Scholar 

  6. Lee H T, Wang H X, Zhang K. Security analysis and modification of ID-based encryption with equality test from ACISP 2017. In: Proceedings of Australasian Conference on Information Security and Privacy. 2018, 780–786

  7. Ling Y H, Ma S, Huang Q, Xiang R, Li X M. Group id-based encryption with equality test. In: Proceedings of Australasian Conference on Information Security and Privacy. 2019, 39–57

  8. Bellare M, Namprempre C, Pointcheval D, Semanko M. The one-more-RSA-inversion problems and the security of chaum’s blind signature scheme. Journal of Cryptology, 2003, 16(3): 185–215

    Article  MATH  Google Scholar 

Download references

Acknowledgements

The work was supported by the National Natural Science Foundation of China (Grant No. 61702005), the Special Fund for Key Program of Science and Technology of Anhui Province, China (18030901027). The authors are very grateful to the anonymous referees for their detailed comments and suggestions regarding this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hong Zhong.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, Y., Wang, M., Zhong, H. et al. IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services. Front. Comput. Sci. 15, 156814 (2021). https://doi.org/10.1007/s11704-020-9396-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-020-9396-2