메뉴 건너뛰기




Volumn 3783 LNCS, Issue , 2005, Pages 414-426

Achieving efficient conjunctive keyword searches over encrypted data

Author keywords

[No Author keywords available]

Indexed keywords

DATA ACQUISITION; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 33646736337     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11602897_35     Document Type: Conference Paper
Times cited : (230)

References (29)
  • 2
    • 33646728544 scopus 로고    scopus 로고
    • Correlation resistant storage
    • Johns Hopkins University Department of Computer Science
    • L. Ballard, M. Green, B. de Medeiros, and F. Monrose. Correlation resistant storage. Technical Report TR-SP-BGMM-050507, Johns Hopkins University Department of Computer Science, 2005.
    • (2005) Technical Report , vol.TR-SP-BGMM-050507
    • Ballard, L.1    Green, M.2    De Medeiros, B.3    Monrose, F.4
  • 3
    • 34547239322 scopus 로고    scopus 로고
    • Achieving efficient conjunctive keyword searches over encrypted data
    • Johns Hopkins University Department of Computer Science
    • L. Ballard, S. Kamara, and F. Monrose. Achieving efficient conjunctive keyword searches over encrypted data. Technical Report TR-SP-BKM-050920, Johns Hopkins University Department of Computer Science, 2005.
    • (2005) Technical Report , vol.TR-SP-BKM-050920
    • Ballard, L.1    Kamara, S.2    Monrose, F.3
  • 4
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Advances in Cryptology - CRYPTO 2002. Springer-Verlag
    • P. Barreto, H. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. In Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 354-369. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 354-369
    • Barreto, P.1    Kim, H.2    Lynn, B.3    Scott, M.4
  • 5
    • 35048900981 scopus 로고    scopus 로고
    • On the selection of pairing-friendly groups
    • Selected Areas in Cryptography -SAC '03. Springer-Verlag
    • P. Barreto, B. Lynn, and M. Scott. On the selection of pairing-friendly groups. In Selected Areas in Cryptography -SAC '03, volume 3006 of Lecture Notes in Computer Science, pages 17-25. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3006 , pp. 17-25
    • Barreto, P.1    Lynn, B.2    Scott, M.3
  • 6
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Advances in Cryptology - CRYPTO 1996. Springer
    • M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Advances in Cryptology - CRYPTO 1996, volume 1109 of Lecture Notes in Computer Science, pages 1-15. Springer, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 7
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 8
    • 84947778144 scopus 로고    scopus 로고
    • The decision-diffie Hellman problem
    • Third International Symposium on Algorithmic Number Theory (ANTS-III). Springer-Verlag
    • D. Boneh. The Decision-Diffie Hellman Problem. In Third International Symposium on Algorithmic Number Theory (ANTS-III), volume 1423 of Lecture Notes in Computer Science, pages 48-63. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1423 , pp. 48-63
    • Boneh, D.1
  • 9
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Advances in Cryptology - CRYPTO 2004. Springer-Verlag
    • D. Boneh, X. Boyen, and H. Sacham. Short group signatures. In Advances in Cryptology - CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 41-55. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Sacham, H.3
  • 10
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Advances in Cryptology - Eurocrypt 2004. Springer-Verlag
    • D. Boneh, G. di Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In Advances in Cryptology - Eurocrypt 2004, volume 3027 of Lecture Notes in Computer Science, pages 506-522. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 12
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Third International Conference on Applied Cryptography and Network Security (ACNS 2005). Springer-Verlag
    • Y. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. In Third International Conference on Applied Cryptography and Network Security (ACNS 2005), volume 3531 of Lecture Notes in Computer Science, pages 442-455. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 442-455
    • Chang, Y.1    Mitzenmacher, M.2
  • 13
    • 33744479345 scopus 로고    scopus 로고
    • Freenet: A distributed anonymous information storage and retrieval system
    • Workshop on Design Issues in Anonymity and Unobservability
    • I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet: a distributed anonymous information storage and retrieval system. In Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science, pages 46-66, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2009 , pp. 46-66
    • Clarke, I.1    Sandberg, O.2    Wiley, B.3    Hong, T.4
  • 15
    • 35048902661 scopus 로고    scopus 로고
    • Time-scoped searching of encrypted audit logs
    • 6th International Conference on Information and Communications Security (ICICS 2004). Springer-Verlag
    • D. Davis, F. Monrose, and M. Reiter. Time-scoped searching of encrypted audit logs. In 6th International Conference on Information and Communications Security (ICICS 2004), volume 3269 of Lecture Notes in Computer Science, pages 532-545. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3269 , pp. 532-545
    • Davis, D.1    Monrose, F.2    Reiter, M.3
  • 17
    • 33646723217 scopus 로고    scopus 로고
    • Secure indexes
    • IACR ePrint Cryptography Archive
    • E-J. Goh. Secure indexes. Technical Report 2003/216, IACR ePrint Cryptography Archive, 2003. See http://eprint.iacr.org/2003/216.
    • (2003) Technical Report , vol.2003 , Issue.216
    • Goh, E.-J.1
  • 18
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • Applied Cryptography and Network Security Conference (ACNS). Springer
    • P. Golle, J. Staddon, and B. Waters. Secure conjunctive keyword search over encrypted data. In Applied Cryptography and Network Security Conference (ACNS), volume 3089 of Lecture Notes in Computer Science, pages 31-45. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3089 , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.3
  • 19
    • 0001685668 scopus 로고    scopus 로고
    • Real life information retrieval: A study of user queries on the web
    • B. Jansen, A. Spink, J. Bateman, and T. Saracevic. Real life information retrieval: a study of user queries on the web. SIGIR Forum, 32(1):5-17, 1998.
    • (1998) SIGIR Forum , vol.32 , Issue.1 , pp. 5-17
    • Jansen, B.1    Spink, A.2    Bateman, J.3    Saracevic, T.4
  • 20
    • 0003657590 scopus 로고
    • Addison-Wesley, Reading, Mass., 2nd edition
    • D. Knuth. The Art of Computer Programming, volume 2. Addison-Wesley, Reading, Mass., 2nd edition, 1981.
    • (1981) The Art of Computer Programming , vol.2
    • Knuth, D.1
  • 22
    • 84957812088 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • 3rd International Workshop on Practice and Theory in Public Key Cryptography (PKC 2000). Springer-Verlag
    • A. Lenstra and E. Verheul. Selecting cryptographic key sizes. In 3rd International Workshop on Practice and Theory in Public Key Cryptography (PKC 2000), volume 1751 of Lecture Notes in Computer Science, pages 446-465. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1751 , pp. 446-465
    • Lenstra, A.1    Verheul, E.2
  • 23
    • 33646740542 scopus 로고    scopus 로고
    • The OpenSSL Library. See http://www.openssl.org.
  • 25
    • 23944469009 scopus 로고    scopus 로고
    • Public key encryption with conjunctive field keyword search
    • 5th International Workshop on Information Security Applications (WISA 2004). Springer-Verlag
    • D. Park, K. Kim, and P. Lee. Public key encryption with conjunctive field keyword search. In 5th International Workshop on Information Security Applications (WISA 2004), volume 3325 of Lecture Notes in Computer Science, pages 73-86. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3325 , pp. 73-86
    • Park, D.1    Kim, K.2    Lee, P.3
  • 26
    • 33646718113 scopus 로고    scopus 로고
    • Authenticated ID-based key exchange and remote log-in with simple to ken and PIN number
    • International Association for Cryptological Research
    • M. Scott. Authenticated ID-based key exchange and remote log-in with simple to ken and PIN number. Technical Report 2002/164, International Association for Cryptological Research, 2002. Available at http://eprint.iacr. org/2002/164.
    • (2002) Technical Report , vol.2002 , Issue.164
    • Scott, M.1
  • 27
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • A. Shamir. How to share a secret. Communications of the ACM, 22:612-613, November 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.