-
1
-
-
84937579774
-
The oracle diffie-hellman assumptions and an analysis of DHIES
-
CT-RSA 2003, Springer-Verlag
-
M. Abdalla, M. Bellare and P. Rogaway, The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES, In CT-RSA 2003, LNCS 2020, pp. 143-158, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2020
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
2
-
-
0842283854
-
Multi-recepient encryption schemes: Security notions and randomness re-use
-
PKC 2003, Springer-Verlag
-
M. Bellare, A. Boldyreva and D. Pointcheval, Multi-Recepient Encryption Schemes: Security Notions and Randomness Re-Use, In PKC 2003, LNCS 2567, pp. 85-99, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 85-99
-
-
Bellare, M.1
Boldyreva, A.2
Pointcheval, D.3
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway, Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, In ACM-CCS, pp. 62-73, 1993.
-
(1993)
ACM-CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
35048901123
-
Public key encryption with keyword search
-
Eurocrypt '04, Springer-Verlag
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky and G. Persiano, Public Key Encryption with Keyword Search, In Eurocrypt '04, LNCS 3027, pp. 506-522, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
5
-
-
0343337504
-
Non-malleable cryptography
-
D. Dolev, C. Dwork and M. Naor, Non-Malleable Cryptography, Siam J. on Computing 30(2), pp. 391-437, 2000.
-
(2000)
Siam J. on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
6
-
-
84958971364
-
Multi-recipient public-key encryption with shortened ciphertext
-
PKC '02, Springer-Verlag
-
K. Kurosawa, Multi-recipient Public-Key Encryption with Shortened Ciphertext, In PKC '02, LNCS 2274, pp. 48-63, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2274
, pp. 48-63
-
-
Kurosawa, K.1
-
7
-
-
84937543435
-
REACT: Rapid enhanced-security asymmetric cryptosystem transform
-
CT-RSA '04, Springer-Verlag
-
T. Okamoto and D. Pointcheval, REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform, In CT-RSA '04, LNCS 2020, pp. 159-175, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.2020
, pp. 159-175
-
-
Okamoto, T.1
Pointcheval, D.2
-
8
-
-
38149084769
-
Searchable keyword-based encryption
-
D. J. Park, J. Cha and P. J. Lee, Searchable Keyword-Based Encryption, In IACR ePrint Archaive, Report 2005/367, 2005.
-
(2005)
IACR EPrint Archaive, Report
, vol.2005
, Issue.367
-
-
Park, D.J.1
Cha, J.2
Lee, P.J.3
-
9
-
-
23944469009
-
Public key encryption with conjunctive field keyword search
-
WISA '04, Springer-Verlag
-
D. J. Park, K. Kim and P. J. Lee, Public Key Encryption with Conjunctive Field Keyword Search,In WISA '04, LNCS 3325, pp. 73-86, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3325
, pp. 73-86
-
-
Park, D.J.1
Kim, K.2
Lee, P.J.3
-
10
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensionsln
-
LNCS Springer-Verlag
-
J. Malone-Lee, M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, G. Neven, P. Paillier and H. Shi. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensionsln Crypto '05, LNCS, pp. 205-222. Springer-Verlag, 2005.
-
(2005)
Crypto '05
, pp. 205-222
-
-
Malone-Lee, J.1
Abdalla, M.2
Bellare, M.3
Catalano, D.4
Kiltz, E.5
Kohno, T.6
Lange, T.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
11
-
-
77952589508
-
Building an encrypted and searchable audit log
-
B. Waters, D. Balfanz, G. Durfee, and D. Smetters, Building an Encrypted and Searchable Audit Log , In Network and Distributed System Security Symposium (NDSS 2004), 2004.
-
(2004)
Network and Distributed System Security Symposium (NDSS 2004)
-
-
Waters, B.1
Balfanz, D.2
Durfee, G.3
Smetters, D.4
|