Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. J. Cryptology, 21(3):350–391, 2008.
    2. J. Baek, R. Safavi-Naini, and W. Susilo. On the integration of public key data encryption and public key encryption with keyword search. In ISC, vol. 4176 of LNCS, pp. 217–232. Springer, 2006.
    3. M. Bellare, A. Boldyreva, and A. O’Neill. Deterministic and efficiently searchable encryption. In CRYPTO, vol. 4622 of LNCS, pp. 535–552. Springer, 2007.
    4. S. Benabbas, R. Gennaro, and Y. Vahlis. Verifiable delegation of computation over large datasets. In CRYPTO, vol. 6841 of LNCS, pp. 111–131. Springer, 2011.
    5. D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In EUROCRYPT, vol. 3027 of LNCS, pp. 506–522. Springer, 2004.
    6. Wang B, Yu S, Lou W, Hou T (2014) PrivacyPreserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud. In: INFOCOM’14. IEEE, Piscataway, N.J, USA. pp 2112–2120
    7. Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: IEEE Transactions on Parallel and Distributed Systems. IEEE, Piscataway, N.J, USA Vol. 25, no. 1. pp 222–233
    8. C. Bosch, Q. Tang, P. H. Hartel, and W. Jonker. Selective document ¨ retrieval from encrypted database. In ISC, vol. 7483 of LNCS, pp. 224– 241. Springer, 2012.
    9. J. Camenisch, M. Kohlweiss, A. Rial, and C. Sheedy. Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In PKC, vol. 5443 of LNCS, pp. 196–214. Springer, 2009.
    10. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multikeyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst., 25(1):222–233, 2014.

Recent Article