scispace - formally typeset
Y

Yanfeng Shi

Researcher at Beijing Jiaotong University

Publications -  13
Citations -  244

Yanfeng Shi is an academic researcher from Beijing Jiaotong University. The author has contributed to research in topics: Encryption & Cloud computing. The author has an hindex of 5, co-authored 12 publications receiving 177 citations.

Papers
More filters
Journal ArticleDOI

Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack

TL;DR: A novel primitive named hidden policy ciphertext-policy attribute-based encryption with keyword search (HP-CPABKS) is proposed, which is unable to search on encrypted data and learn any information about the access structure if his/her attribute credentials cannot satisfy the access control policy specified by the data owner.
Journal ArticleDOI

Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation

TL;DR: This paper proposes a novel ABE variant, dubbed directly revocable key-policyABE with verifiable ciphertext delegation (drvuKPABE), which supports direct revocation and verifiable Ciphertext delegation and attains the security properties under the ( d + 3 -Multilinear Decisional Diffie-Hellman assumption in the random oracle model.
Journal ArticleDOI

Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data

TL;DR: This paper proposes a new framework for enforcing privacy in frequent itemset mining, where data are both collected and mined in an encrypted form in a public cloud service, and specifically design three secure frequent item set mining protocols on top of this framework.
Journal ArticleDOI

Identity-Based Private Matching over Outsourced Encrypted Datasets

TL;DR: An Identity-Based Private Matching scheme, which realizes fine-grained authorization that enables the privileged cloud server to perform private matching operations without leaking any private data, and the rigorous security proof under the Decisional Linear Assumption and Decisional Bilinear Diffie-Hellman Assumption is presented.
Journal ArticleDOI

Attribute-Based Proxy Re-Encryption with Keyword Search

TL;DR: A novel notion called attribute-based proxy re-encryption with keyword search is introduced, which introduces a promising feature: in addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy.