메뉴 건너뛰기




Volumn 4784 LNCS, Issue , 2007, Pages 228-236

Decryptable searchable encryption

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; FUNCTIONS; SEARCH ENGINES; SECURITY OF DATA; STOCHASTIC MODELS;

EID: 38149055585     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75670-5_17     Document Type: Conference Paper
Times cited : (73)

References (19)
  • 1
    • 33745134401 scopus 로고    scopus 로고
    • Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 205-222
    • Abdalla, M.1    Bellare, M.2    Catalano, D.3    Kiltz, E.4    Kohno, T.5    Lange, T.6    Malone-Lee, J.7    Neven, G.8    Paillier, P.9    Shi, H.10
  • 2
    • 24944516264 scopus 로고    scopus 로고
    • Tag-kem/dem: A new framework for hybrid encryption and a new analysis of the kurosawa-desmedt kem
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-kem/dem: A new framework for hybrid encryption and a new analysis of the kurosawa-desmedt kem. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 426-442. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 426-442
    • Abe, M.1    Gennaro, R.2    Kurosawa, K.3    Shoup, V.4
  • 3
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 4
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose identity-based signcryption (a swiss army knife for identity-based cryptography)
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Boyen, X.: Multipurpose identity-based signcryption (a swiss army knife for identity-based cryptography). In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383-399. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 383-399
    • Boyen, X.1
  • 7
    • 35248844436 scopus 로고    scopus 로고
    • Cha, J.C., Cheon, J.H.: An identity-based signature from gap diffie-hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 18-30. Springer, Heidelberg (2002)
    • Cha, J.C., Cheon, J.H.: An identity-based signature from gap diffie-hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18-30. Springer, Heidelberg (2002)
  • 8
    • 38049109544 scopus 로고    scopus 로고
    • An efficient ID-KEM based on the sakai-kasahara key construction. In: Cryptology ePrint Archive
    • Report 2005/224
    • Chen, L., Cheng, Z., Malone-Lee, J., Smart, N.P.: An efficient ID-KEM based on the sakai-kasahara key construction. In: Cryptology ePrint Archive, Report 2005/224 (2005), http://eprint.iacr.org/
    • (2005)
    • Chen, L.1    Cheng, Z.2    Malone-Lee, J.3    Smart, N.P.4
  • 9
    • 84958975228 scopus 로고    scopus 로고
    • Coron, J.-S., Handschuh, H., Joye, M., Paillier, P., Pointcheval, D., Tymen, C.: Optimal chosen-ciphertext secure encryption of arbitrary-length messages. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, 2274, pp. 17-33. Springer, Heidelberg (2002)
    • Coron, J.-S., Handschuh, H., Joye, M., Paillier, P., Pointcheval, D., Tymen, C.: Optimal chosen-ciphertext secure encryption of arbitrary-length messages. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 17-33. Springer, Heidelberg (2002)
  • 10
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen-ciphertext attacks
    • Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen-ciphertext attacks. SIAM Journal on Computing 33(1), 167-226 (2003)
    • (2003) SIAM Journal on Computing , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 11
    • 84874800178 scopus 로고
    • A public key cryptosystem and signature scheme based on discrete logarithms
    • ElGamal, T.: A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31, 469-472 (1985)
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 13
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
    • Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 14
    • 84937389342 scopus 로고    scopus 로고
    • Okamoto, T., Pointcheval, D.: The gap-problems: A new class of problems for the security of cryptographic schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, 1992, pp. 104-118. Springer, Heidelberg (2001)
    • Okamoto, T., Pointcheval, D.: The gap-problems: A new class of problems for the security of cryptographic schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104-118. Springer, Heidelberg (2001)
  • 15
    • 33646784002 scopus 로고    scopus 로고
    • Discrete-log-based signatures may not be equivalent to discrete log
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Paillier, P., Vergnaud, D.: Discrete-log-based signatures may not be equivalent to discrete log. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 1-20. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 1-20
    • Paillier, P.1    Vergnaud, D.2
  • 16
    • 77649259271 scopus 로고    scopus 로고
    • Trading one-wayness against chosen-ciphertext security in factoring-based encryption
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Paillier, P., Villar, J.: Trading one-wayness against chosen-ciphertext security in factoring-based encryption. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 252-266. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 252-266
    • Paillier, P.1    Villar, J.2
  • 17
    • 78650717533 scopus 로고    scopus 로고
    • Paillier, P.: Impossibility proofs for RSA signatures in the standard model. In: Abe, M. (ed.) CT-RSA 2007. LNCS, 4377, pp. 31-48. Springer, Heidelberg (2006)
    • Paillier, P.: Impossibility proofs for RSA signatures in the standard model. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 31-48. Springer, Heidelberg (2006)
  • 18
    • 84957795480 scopus 로고    scopus 로고
    • Pointcheval, D.: Chosen-ciphertext security for any one-way cryptosystem. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, 1751, pp. 129-146. Springer, Heidelberg (2000)
    • Pointcheval, D.: Chosen-ciphertext security for any one-way cryptosystem. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 129-146. Springer, Heidelberg (2000)
  • 19
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.