메뉴 건너뛰기




Volumn 3982 LNCS, Issue , 2006, Pages 298-308

Public key encryption with keyword search based on K-resilient IBE

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER PRIVACY; DATA PRIVACY; ELECTRONIC MAIL; INFORMATION THEORY; SEARCH ENGINES;

EID: 33745922362     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11751595_33     Document Type: Conference Paper
Times cited : (42)

References (12)
  • 2
    • 54249101916 scopus 로고    scopus 로고
    • Public key encryption with keyword search revisited
    • J. Baek, R. Naini, and W. Susilo. Public key encryption with keyword search revisited. Cryptology ePrint Archive, Report 2005/191, 2005. http://eprint.iacr.org/.
    • (2005) Cryptology ePrint Archive, Report , vol.2005 , Issue.191
    • Baek, J.1    Naini, R.2    Susilo, W.3
  • 3
    • 84946837370 scopus 로고    scopus 로고
    • Key-privacy in public-key cryptography
    • Advances in Cryptology - ASIACRYPT 2001, Springer-Verlag
    • M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval. Key-privacy in public-key cryptography. In Advances in Cryptology - ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 566-582. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 566-582
    • Bellare, M.1    Boldyreva, A.2    Desai, A.3    Pointcheval, D.4
  • 5
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • D. Boneh and M. Franklin. Identity based encryption from the Weil pairing. SIAM Journal on Computing, 32(3):586-615, 2003.
    • (2003) SIAM Journal on Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 6
    • 14844315859 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Dan Boneh and Xavier Boyen. Short signatures without random oracles. Cryptology ePrint Archive, Report 2004/171, 2004. http://eprint.iacr.org/.
    • (2004) Cryptology ePrint Archive, Report , vol.2004 , Issue.171
    • Boneh, D.1    Boyen, X.2
  • 7
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Advances in Cryptology - CRYPTO '98, Springer-Verlag
    • R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Advances in Cryptology - CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pages 13-25. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 10
    • 32244433334 scopus 로고    scopus 로고
    • K-resilient identity-based encryption in the standard model
    • Springer-Verlag
    • S. Heng and K. Kurosawa. K-resilient identity-based encryption in the standard model. In Topics in Cryptology CT-RSA 2004, volume 2964, pages 67-80. Springer-Verlag, 2004.
    • (2004) Topics in Cryptology CT-RSA 2004 , vol.2964 , pp. 67-80
    • Heng, S.1    Kurosawa, K.2
  • 11
    • 23944469009 scopus 로고    scopus 로고
    • Public key encryption with conjunctive field keyword search
    • D. Park, K. Kim, and P. Lee. Public key encryption with conjunctive field keyword search. Lecture Notes in Computer Science, 3325:73-86, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3325 , pp. 73-86
    • Park, D.1    Kim, K.2    Lee, P.3
  • 12
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology - CRYPTO '84, Springer-Verlag
    • A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology - CRYPTO '84, volume 0193 of Lecture Notes in Computer Science, pages 47-53. Springer-Verlag, 1984.
    • (1984) Lecture Notes in Computer Science , vol.193 , pp. 47-53
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.