-
1
-
-
84941154125
-
Encryption with keyword search, revisited: Consistency conditions, relations to anonymous IBE, and extensions
-
This paper will be appear in
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, "Encryption with keyword search, revisited: consistency conditions, relations to anonymous IBE, and extensions". This paper will be appear in Crypto05.
-
Crypto05
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
3
-
-
17444370055
-
Public key Encryption with keyword search
-
LNCS Vol. 3089, Springer-Verlag
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search", In Proceedings of Eurocrypt '04, LNCS Vol. 3089, pp. 31-45, Springer-Verlag, 2004.
-
(2004)
Proceedings of Eurocrypt '04
, pp. 31-45
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
4
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing", SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
0003160114
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, "Private Information Retrieval", In Proceedings of 29th STOC, 1997.
-
(1997)
Proceedings of 29th STOC
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
7
-
-
44049096900
-
Privacy preserving keyword searches on remote encrypted data
-
This paper will be appeared in. An early version of this paper is appeared on
-
Y. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data", This paper will be appeared in ACNS 2005. An early version of this paper is appeared on Cryptology ePrint Archieve. Availabe at http://eprint.iacr.org/2004/051
-
ACNS 2005
-
-
Chang, Y.1
Mitzenmacher, M.2
-
8
-
-
33745120364
-
Secure Conjunctive keyword search over encrytped data
-
LNCS Vol. 3089, Springer-Verlag
-
P. Golle, J. Staddon, and B. Waters, "Secure Conjunctive keyword search over encrytped data", In Proceedings of ACNS '04, LNCS Vol. 3089, pp. 31-45, Springer-Verlag, 2004.
-
(2004)
Proceedings of ACNS '04
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
11
-
-
84941163530
-
Private keyword search on streaming data
-
This paper will be appear in
-
R. Ostrovsky and W. Skeith, "Private keyword search on streaming data", This paper will be appear in Crypto05.
-
Crypto05
-
-
Ostrovsky, R.1
Skeith, W.2
-
12
-
-
1942420748
-
Oblivious keyword search
-
W. Ogata and K. Kurosawa, "Oblivious keyword search" Journal of Complexity Vol. 20, Issues 2-3, pp. 356-371, 2004.
-
(2004)
Journal of Complexity
, vol.20
, Issue.2-3
, pp. 356-371
-
-
Ogata, W.1
Kurosawa, K.2
-
13
-
-
23944469009
-
Public key encryption with conjunctive field keyword search
-
LNCS Vol. 3325, Springer-Verlag
-
D. J. Park, K. Kim, and P. J. Lee, "Public Key Encryption with Conjunctive Field Keyword Search", In Proceedings of WISA '04, LNCS Vol. 3325, pp. 73-86, Springer-Verlag, 2004.
-
(2004)
Proceedings of WISA '04
, pp. 73-86
-
-
Park, D.J.1
Kim, K.2
Lee, P.J.3
|