Y
Yanfeng Shi
Researcher at Beijing Jiaotong University
Publications - 13
Citations - 244
Yanfeng Shi is an academic researcher from Beijing Jiaotong University. The author has contributed to research in topics: Encryption & Cloud computing. The author has an hindex of 5, co-authored 12 publications receiving 177 citations.
Papers
More filters
Journal ArticleDOI
Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack
TL;DR: A novel primitive named hidden policy ciphertext-policy attribute-based encryption with keyword search (HP-CPABKS) is proposed, which is unable to search on encrypted data and learn any information about the access structure if his/her attribute credentials cannot satisfy the access control policy specified by the data owner.
Journal ArticleDOI
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
TL;DR: This paper proposes a novel ABE variant, dubbed directly revocable key-policyABE with verifiable ciphertext delegation (drvuKPABE), which supports direct revocation and verifiable Ciphertext delegation and attains the security properties under the ( d + 3 -Multilinear Decisional Diffie-Hellman assumption in the random oracle model.
Journal ArticleDOI
Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data
TL;DR: This paper proposes a new framework for enforcing privacy in frequent itemset mining, where data are both collected and mined in an encrypted form in a public cloud service, and specifically design three secure frequent item set mining protocols on top of this framework.
Journal ArticleDOI
Identity-Based Private Matching over Outsourced Encrypted Datasets
TL;DR: An Identity-Based Private Matching scheme, which realizes fine-grained authorization that enables the privileged cloud server to perform private matching operations without leaking any private data, and the rigorous security proof under the Decisional Linear Assumption and Decisional Bilinear Diffie-Hellman Assumption is presented.
Journal ArticleDOI
Attribute-Based Proxy Re-Encryption with Keyword Search
TL;DR: A novel notion called attribute-based proxy re-encryption with keyword search is introduced, which introduces a promising feature: in addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy.