Articles with "equality test" as a keyword



Photo by drew_hays from unsplash

Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2756070

Abstract: The privacy of users must be considered as the utmost priority in distributed networks. To protect the identities of users, attribute-based encryption (ABE) was presented by Sahai et al. ABE has been widely used in… read more here.

Keywords: equality test; attribute based; based encryption; test ... See more keywords
Photo by lukaszlada from unsplash

Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2899680

Abstract: With the higher rate of using cloud storage, protecting data privacy becomes an important issue. The most effective solution is to encrypt data before uploading to the cloud. However, how to efficiently search over data… read more here.

Keywords: test; equality test; cloud storage; ciphertexts ... See more keywords
Photo from wikipedia

Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2920897

Abstract: Privacy-presenting for cloud computing has been concerned for several years. Public key encryption with equality test as a variant of keyword searchable encryption is one of the important concepts in this area. In order to… read more here.

Keywords: scheme; equality test; identity based; encryption ... See more keywords
Photo from wikipedia

KS-ABESwET: A Keyword Searchable Attribute-Based Encryption Scheme With Equality Test in the Internet of Things

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2922646

Abstract: With the widespread application of the Internet of Things (IoT) technology, it is expected to become a new data management model. But IoT devices have limited resource storage and computing power, they are highly vulnerable… read more here.

Keywords: keyword; scheme; test; attribute based ... See more keywords
Photo from wikipedia

Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2940646

Abstract: Due to the massive growth of data and security concerns, data of patients would be encrypted and outsourced to the cloud server for feature matching in various medical scenarios, such as personal health record systems,… read more here.

Keywords: related groups; public key; diagnostic related; equality test ... See more keywords
Photo by campaign_creators from unsplash

Attribute-Based Equality Test Over Encrypted Data Without Random Oracles

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2973459

Abstract: Sensitive data would be encrypted before uploading to the cloud due to the privacy issue. However, how to compare the encrypted data efficiently becomes a problem. Public Key Encryption with Equality Test (PKEET) provides an… read more here.

Keywords: encrypted data; equality; attribute based; equality test ... See more keywords
Photo by drew_hays from unsplash

Pairing-Free for Public Key Encryption With Equality Test Scheme

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3081709

Abstract: The modular exponentiation has been proved better in terms of computational efficiency as compared to bilinear pairing. Therefore, discrete logarithm, a concept of modular exponentiation may be incorporated to present improved security schemes. With this… read more here.

Keywords: public key; scheme; test; equality test ... See more keywords
Photo by drew_hays from unsplash

Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2021.3106701

Abstract: In cloud storage, public key encryption with equality test (PKEET) is suitable for testing whether two ciphertexts generated from different public keys contain the same message without decryption. Recently, (Y. J. Wang et al., 2019)… read more here.

Keywords: pkeet; equality test; pks det; test ... See more keywords
Photo from wikipedia

Investigating Temporal Kinematic Differences Caused by Unexpected Stimulation during Gait Termination through the Waveform-Level Variance Equality Test

Sign Up to like & get
recommendations!
Published in 2022 at "BioMed Research International"

DOI: 10.1155/2022/4043426

Abstract: The efficacy of the variance equality test in steady-state gait analysis is well documented; however, temporal information on where differences in variability occur during gait subtasks, especially during gait termination caused by unexpected stimulation, is… read more here.

Keywords: equality test; gait termination; gait; variance equality ... See more keywords
Photo from wikipedia

New constructions of equality test scheme for cloud-assisted wireless sensor networks

Sign Up to like & get
recommendations!
Published in 2021 at "PLoS ONE"

DOI: 10.1371/journal.pone.0258746

Abstract: Public key encryption with equality test enables the user to determine whether two ciphertexts contain the same information without decryption. Therefore, it may serve as promising cryptographic technique for cloud-assisted wireless sensor networks (CWSNs) to… read more here.

Keywords: assisted wireless; equality test; cloud assisted; scheme ... See more keywords
Photo by drew_hays from unsplash

Traceable Scheme of Public Key Encryption with Equality Test

Sign Up to like & get
recommendations!
Published in 2022 at "Entropy"

DOI: 10.3390/e24030309

Abstract: Public key encryption supporting equality test (PKEwET) schemes, because of their special function, have good applications in many fields, such as in cloud computing services, blockchain, and the Internet of Things. The original PKEwET has… read more here.

Keywords: equality test; key encryption; equality; scheme ... See more keywords