메뉴 건너뛰기




Volumn 3621 LNCS, Issue , 2006, Pages 205-222

Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMOUS IBE SCHEME; COMPUTATIONALLY CONSISTENT; IDENTITY-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION;

EID: 33745134401     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (450)

References (20)
  • 2
    • 0030679849 scopus 로고    scopus 로고
    • A public-key cryptosystem with worst-case/average-case equivalence
    • ACM Press
    • M. Ajtai and C. Dwork. A public-key cryptosystem with worst-case/average-case equivalence. In 29th ACM STOC. ACM Press, 1997.
    • (1997) 29th ACM STOC
    • Ajtai, M.1    Dwork, C.2
  • 4
    • 79958074367 scopus 로고    scopus 로고
    • A forward-secure digital signature scheme
    • Springer
    • M. Bellare and S. K. Miner. A forward-secure digital signature scheme. In CRYPTO'99, LNCS 1666. Springer, 1999.
    • (1999) CRYPTO'99, LNCS , vol.1666
    • Bellare, M.1    Miner, S.K.2
  • 5
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • ACM Press
    • M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS 93. ACM Press, 1993.
    • (1993) ACM CCS 93
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Springer
    • D. Boneh, X. Boyen, and E.-J. Goh. Hierarchical identity based encryption with constant size ciphertext. In EUROCRYPT 2005, LNCS 3494. Springer, 2005.
    • (2005) EUROCRYPT 2005, LNCS , vol.3494
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 8
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • D. Boneh and M. K. Franklin. Identity based encryption from the Weil pairing. SIAM Journal on Computing, 32(3), 2003.
    • (2003) SIAM Journal on Computing , vol.32 , Issue.3
    • Boneh, D.1    Franklin, M.K.2
  • 9
    • 35248897599 scopus 로고    scopus 로고
    • A forward-secure public-key encryption scheme
    • Springer
    • R. Canetti, S. Halevi, and J. Katz. A forward-secure public-key encryption scheme. In EUROCRYPT 2003, LNCS 2656. Springer, 2003.
    • (2003) EUROCRYPT 2003, LNCS , vol.2656
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 10
    • 35048881610 scopus 로고    scopus 로고
    • Immunizing encryption schemes from decryption errors
    • Springer
    • C. Dwork, M. Naor, and O. Reingold. Immunizing encryption schemes from decryption errors. In EUROCRYPT 2004, LNCS 3027. Springer, 2004.
    • (2004) EUROCRYPT 2004, LNCS , vol.3027
    • Dwork, C.1    Naor, M.2    Reingold, O.3
  • 11
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • Springer
    • C. Gentry and A. Silverberg. Hierarchical ID-based cryptography. In ASIACRYPT 2002, LNCS 2501. Springer, 2002.
    • (2002) ASIACRYPT 2002, LNCS , vol.2501
    • Gentry, C.1    Silverberg, A.2
  • 14
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • Springer
    • P. Golle, J. Staddon, and B. R. Waters. Secure conjunctive keyword search over encrypted data. In ACNS 2004, LNCS 3089. Springer, 2004.
    • (2004) ACNS 2004, LNCS , vol.3089
    • Golle, P.1    Staddon, J.2    Waters, B.R.3
  • 15
    • 33646764832 scopus 로고    scopus 로고
    • A sufficient condition for key-privacy
    • S. Halevi. A sufficient condition for key-privacy. Cryptology ePrint Archive, Report 2005/005, 2005.
    • (2005) Cryptology EPrint Archive, Report , vol.2005 , Issue.5
    • Halevi, S.1
  • 16
    • 84947242701 scopus 로고    scopus 로고
    • Toward hierarchical identity-based encryption
    • Springer
    • J. Horwitz and B. Lynn. Toward hierarchical identity-based encryption. In EUROCRYPT 2002, LNCS 2332, Springer, 2002.
    • (2002) EUROCRYPT 2002, LNCS , vol.2332
    • Horwitz, J.1    Lynn, B.2
  • 17
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer
    • A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO'84, LNCS 196. Springer, 1985.
    • (1985) CRYPTO'84, LNCS , vol.196
    • Shamir, A.1
  • 19
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Springer
    • B. R. Waters. Efficient identity-based encryption without random oracles. In EUROCRYPT 2005, LNCS 3494. Springer, 2005.
    • (2005) EUROCRYPT 2005, LNCS , vol.3494
    • Waters, B.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.