Insight of the protection for data security under selective opening attacks
From MaRDI portal
Publication:778391
DOI10.1016/j.ins.2017.05.031zbMath1435.68079OpenAlexW2618824331WikidataQ115042055 ScholiaQ115042055MaRDI QIDQ778391
Zhengan Huang, Shengli Liu, Jin Li, Xianping Mao, Ke-Fei Chen
Publication date: 2 July 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2017.05.031
Related Items (10)
Efficient and secure big data storage system with leakage resilience in cloud computing ⋮ Efficient and secure outsourcing of differentially private data publication ⋮ Differentially private naive Bayes learning over multiple data sources ⋮ Notes on a provably-secure certificate-based encryption against malicious CA attacks ⋮ KDM security for identity-based encryption: constructions and separations ⋮ A weighted K-member clustering algorithm for K-anonymization ⋮ Practical public key encryption with selective opening security for receivers ⋮ A hierarchical group key agreement protocol using orientable attributes for cloud computing ⋮ Public audit for operation behavior logs with error locating in cloud storage ⋮ A strong designated verifier proxy re-signature scheme for IoT environments
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Hidden attribute-based signatures without anonymity revocation
- Probabilistic encryption
- Selective Opening Security for Receivers
- All-But-Many Lossy Trapdoor Functions
- Standard Security Does Not Imply Security against Selective-Opening
- On Definitions of Selective Opening Security
- Relations Among Notions of Non-malleability for Encryption
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Nonmalleable Cryptography
- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
- Standard versus Selective Opening Security: Separation and Equivalence Results
This page was built for publication: Insight of the protection for data security under selective opening attacks