Skip to main content
Log in

Secure key-aggregation authorized searchable encryption

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Liang J, Han W L, Guo Z Q, et al. DESC: enabling secure data exchange based on smart contracts. Sci China Inf Sci, 2018, 61: 049102

    Google Scholar 

  2. Bao F, Deng R H, Ding X H, et al. Private query on encrypted data in multi-user settings. In: Proceedings of International Conference on Information Security Practice and Experience. Berlin: Springer, 2008. 71–85

    Google Scholar 

  3. Dong C Y, Russello G, Dulay N. Shared and searchable encrypted data for untrusted servers. J Comput Secur, 2011, 19: 367–397

    Article  Google Scholar 

  4. Li M, Yu S C, Cao N, et al. Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS), 2011. 383–392

    Google Scholar 

  5. Shi J, Lai J Z, Li Y J, et al. Authorized keyword search on encrypted data. In: Proceedings of European Symposium on Research in Computer Security. Berlin: Springer, 2014. 419–435

    Google Scholar 

  6. Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Advances in Cryptology—CRYPTO. Berlin: Springer, 2005. 3621: 258–275

    Google Scholar 

  7. Cui B J, Liu Z L, Wang L Y. Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage. IEEE Trans Comput, 2016, 65: 2374–2385

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This work was supported in part by National Natural Science Foundation of China (Grant Nos. 61632012, 61672239), in part by Shanghai High-Tech Field Project (Grant No. 16511101400), and in part by Fundamental Research Funds for the Central Universities.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xiaolei Dong or Zhenfu Cao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, H., Dong, X., Cao, Z. et al. Secure key-aggregation authorized searchable encryption. Sci. China Inf. Sci. 62, 39111 (2019). https://doi.org/10.1007/s11432-017-9508-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-017-9508-3

Navigation