References
Liang J, Han W L, Guo Z Q, et al. DESC: enabling secure data exchange based on smart contracts. Sci China Inf Sci, 2018, 61: 049102
Bao F, Deng R H, Ding X H, et al. Private query on encrypted data in multi-user settings. In: Proceedings of International Conference on Information Security Practice and Experience. Berlin: Springer, 2008. 71–85
Dong C Y, Russello G, Dulay N. Shared and searchable encrypted data for untrusted servers. J Comput Secur, 2011, 19: 367–397
Li M, Yu S C, Cao N, et al. Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS), 2011. 383–392
Shi J, Lai J Z, Li Y J, et al. Authorized keyword search on encrypted data. In: Proceedings of European Symposium on Research in Computer Security. Berlin: Springer, 2014. 419–435
Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Advances in Cryptology—CRYPTO. Berlin: Springer, 2005. 3621: 258–275
Cui B J, Liu Z L, Wang L Y. Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage. IEEE Trans Comput, 2016, 65: 2374–2385
Acknowledgements
This work was supported in part by National Natural Science Foundation of China (Grant Nos. 61632012, 61672239), in part by Shanghai High-Tech Field Project (Grant No. 16511101400), and in part by Fundamental Research Funds for the Central Universities.
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Wang, H., Dong, X., Cao, Z. et al. Secure key-aggregation authorized searchable encryption. Sci. China Inf. Sci. 62, 39111 (2019). https://doi.org/10.1007/s11432-017-9508-3
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-017-9508-3