-
1
-
-
33750089381
-
-
Full version of current paper. Available at IACR Cryptology ePrint Archive
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. Full version of current paper. Available at IACR Cryptology ePrint Archive, http://eprint.iacr.org.
-
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous Ibe, and Extensions
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
0030679849
-
A public-key cryptosystem with worst-case/average-case equivalence
-
ACM Press
-
M. Ajtai and C. Dwork. A public-key cryptosystem with worst-case/average-case equivalence. In 29th ACM STOC. ACM Press, 1997.
-
(1997)
29th ACM STOC
-
-
Ajtai, M.1
Dwork, C.2
-
3
-
-
84946837370
-
Key-privacy in public-key encryption
-
Springer
-
M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval. Key-privacy in public-key encryption. In ASIACRYPT 2001, LNCS 2248. Springer, 2001.
-
(2001)
ASIACRYPT 2001, LNCS
, vol.2248
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
4
-
-
79958074367
-
A forward-secure digital signature scheme
-
Springer
-
M. Bellare and S. K. Miner. A forward-secure digital signature scheme. In CRYPTO'99, LNCS 1666. Springer, 1999.
-
(1999)
CRYPTO'99, LNCS
, vol.1666
-
-
Bellare, M.1
Miner, S.K.2
-
5
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM Press
-
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS 93. ACM Press, 1993.
-
(1993)
ACM CCS 93
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Springer
-
D. Boneh, X. Boyen, and E.-J. Goh. Hierarchical identity based encryption with constant size ciphertext. In EUROCRYPT 2005, LNCS 3494. Springer, 2005.
-
(2005)
EUROCRYPT 2005, LNCS
, vol.3494
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
7
-
-
35048901123
-
Public key encryption with keyword search
-
Springer
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In EUROCRYPT 2004, LNCS 3027. Springer, 2004.
-
(2004)
EUROCRYPT 2004, LNCS
, vol.3027
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
8
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
D. Boneh and M. K. Franklin. Identity based encryption from the Weil pairing. SIAM Journal on Computing, 32(3), 2003.
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
-
-
Boneh, D.1
Franklin, M.K.2
-
9
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
Springer
-
R. Canetti, S. Halevi, and J. Katz. A forward-secure public-key encryption scheme. In EUROCRYPT 2003, LNCS 2656. Springer, 2003.
-
(2003)
EUROCRYPT 2003, LNCS
, vol.2656
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
10
-
-
35048881610
-
Immunizing encryption schemes from decryption errors
-
Springer
-
C. Dwork, M. Naor, and O. Reingold. Immunizing encryption schemes from decryption errors. In EUROCRYPT 2004, LNCS 3027. Springer, 2004.
-
(2004)
EUROCRYPT 2004, LNCS
, vol.3027
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
-
11
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Springer
-
C. Gentry and A. Silverberg. Hierarchical ID-based cryptography. In ASIACRYPT 2002, LNCS 2501. Springer, 2002.
-
(2002)
ASIACRYPT 2002, LNCS
, vol.2501
-
-
Gentry, C.1
Silverberg, A.2
-
14
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
Springer
-
P. Golle, J. Staddon, and B. R. Waters. Secure conjunctive keyword search over encrypted data. In ACNS 2004, LNCS 3089. Springer, 2004.
-
(2004)
ACNS 2004, LNCS
, vol.3089
-
-
Golle, P.1
Staddon, J.2
Waters, B.R.3
-
15
-
-
33646764832
-
A sufficient condition for key-privacy
-
S. Halevi. A sufficient condition for key-privacy. Cryptology ePrint Archive, Report 2005/005, 2005.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.5
-
-
Halevi, S.1
-
16
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
Springer
-
J. Horwitz and B. Lynn. Toward hierarchical identity-based encryption. In EUROCRYPT 2002, LNCS 2332, Springer, 2002.
-
(2002)
EUROCRYPT 2002, LNCS
, vol.2332
-
-
Horwitz, J.1
Lynn, B.2
-
17
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer
-
A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO'84, LNCS 196. Springer, 1985.
-
(1985)
CRYPTO'84, LNCS
, vol.196
-
-
Shamir, A.1
-
19
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Springer
-
B. R. Waters. Efficient identity-based encryption without random oracles. In EUROCRYPT 2005, LNCS 3494. Springer, 2005.
-
(2005)
EUROCRYPT 2005, LNCS
, vol.3494
-
-
Waters, B.R.1
|