-
1
-
-
33745134401
-
Encryption with keyword search, revisited: Consistency conditions, relations to anonymous IBE, and extensions
-
LNCS, Springer-Verlag
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, "Encryption with keyword search, revisited: consistency conditions, relations to anonymous IBE, and extensions", In Proceedings of Crypto '05, LNCS Vol. 3621, pp. 205-222, Springer-Verlag, 2005.
-
(2005)
Proceedings of Crypto '05
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom, "Space/time trade-offs in hash coding with allowable errors", Communications of the ACM, 13(7):422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
3
-
-
17444370055
-
Public key encryption with keyword search
-
LNCS, Springer-Verlag
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search", In Proceedings of Eurocrypt '04, LNCS Vol. 3089, pp. 31-45, Springer-Verlag, 2004.
-
(2004)
Proceedings of Eurocrypt '04
, vol.3089
, pp. 31-45
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
4
-
-
0003160114
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, "Private Information Retrieval", In Proceedings of 29th STOC, 1997.
-
(1997)
Proceedings of 29th STOC
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
6
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
LNCS, Springer-Verlag, An early version of this paper is appeared on Cryptology ePrint Archieve
-
Y. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data", In Proceedings of ACNS '05 LNCS Vol. 3531, pp. 442-455, Springer-Verlag, 2005, An early version of this paper is appeared on Cryptology ePrint Archieve. Availabe at http://eprint.iacr.org/2004/051
-
(2005)
Proceedings of ACNS '05
, vol.3531
, pp. 442-455
-
-
Chang, Y.1
Mitzenmacher, M.2
-
7
-
-
33745120364
-
Secure conjunctive keyword search over encrytped data
-
LNCS, Springer-Verlag
-
P. Golle, J. Staddon, and B. Waters, "Secure Conjunctive keyword search over encrytped data", In Proceedings of ACNS '04, LNCS Vol. 3089, pp. 31-45, Springer-Verlag, 2004.
-
(2004)
Proceedings of ACNS '04
, vol.3089
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
8
-
-
33244488406
-
-
Cryptology ePrint Archieve on March 16, 2004
-
E. Goh, "Secure Indexes", In Cryptology ePrint Archieve on March 16, 2004, This paper is availabe at http://eprint.iacr.org/2003/216
-
Secure Indexes
-
-
Goh, E.1
-
10
-
-
84941163530
-
Private keyword search on streaming data
-
R. Ostrovsky and W. Skeith, "Private keyword search on streaming data", This paper will be appear in Crypto05.
-
Crypto05
-
-
Ostrovsky, R.1
Skeith, W.2
-
11
-
-
1942420748
-
Oblivious keyword search
-
W. Ogata and K. Kurosawa, "Oblivious keyword search" Journal of Complexity Vol. 20, Issues 2-3, pp. 356-371, 2004.
-
(2004)
Journal of Complexity
, vol.20
, Issue.2-3
, pp. 356-371
-
-
Ogata, W.1
Kurosawa, K.2
-
12
-
-
23944469009
-
Public key encryption with conjunctive field keyword search
-
LNCS, Springer-Verlag
-
D. J. Park, K. Kim, and P. J. Lee, "Public Key Encryption with Conjunctive Field Keyword Search", In Proceedings of WISA '04, LNCS Vol. 3325, pp. 73-86, Springer-Verlag, 2004.
-
(2004)
Proceedings of WISA '04
, vol.3325
, pp. 73-86
-
-
Park, D.J.1
Kim, K.2
Lee, P.J.3
|