-
1
-
-
33745134401
-
Searchable Encryption Revisite: Consistency Properties, Ration to Anonymous IBE, and Extensions
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable Encryption Revisite: Consistency Properties, Ration to Anonymous IBE, and Extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
35048901123
-
Public key encryption with keyword search
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
3
-
-
0036957230
-
-
1/(2k-21)) barrier for information-theoretic private information retrieval. In: Proc. FOCS 2002, pp. 261-270 (2002)
-
1/(2k-21)) barrier for information-theoretic private information retrieval. In: Proc. FOCS 2002, pp. 261-270 (2002)
-
-
-
-
4
-
-
33646736337
-
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data
-
Qing, S, Mao, W, López, J, Wang, G, eds, ICICS 2005, Springer, Heidelberg
-
Ballard, L., Kamara, S., Monrose, F.: Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 414-426. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3783
, pp. 414-426
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
-
5
-
-
0027726717
-
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. ACM Conference on Computer and Communications Security, CCS 1993, pp. 62-73 (1993)
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. ACM Conference on Computer and Communications Security, CCS 1993, pp. 62-73 (1993)
-
-
-
-
6
-
-
84946840347
-
Short Signatures from the Weil Pairing
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS. vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
7
-
-
0031619016
-
The random oracle methodology, revisited
-
Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. In: Proc. STOC 1998, pp. 209-218 (1998)
-
(1998)
Proc. STOC 1998
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
8
-
-
34547240272
-
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
-
CCS
-
Curtmola, R., Garay, J., Kamara, S., Ostrovskey, R.: Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. In: Proc. ACM Conference on Computer and Communications Security. CCS 2006, pp. 79-88 (2006)
-
(2006)
Proc. ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovskey, R.4
-
9
-
-
0001835239
-
-
Journal of the ACM
-
Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. Journal of the ACM (1995)
-
(1995)
Private information retrieval
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
10
-
-
26444507272
-
-
Chang, Y., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 442-455. Springer, Heidelberg (2005)
-
Chang, Y., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005)
-
-
-
-
11
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Odlyzko. A.M, ed, CRYPTO 1986, Springer. Heidelberg
-
Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko. A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer. Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
12
-
-
33244488406
-
-
Goh, E.: Secure Indexes (2003), http://crypto.stanford.edu/~eujin/papers/ secureindex/secureindex.pdf
-
(2003)
Secure Indexes
-
-
Goh, E.1
-
14
-
-
0030149547
-
Software Protection and Simulation on oblivious RAMs
-
Goldreich, O., Ostrovsky, R.: Software Protection and Simulation on oblivious RAMs. Journal of ACM 43(3), 431-473 (1996)
-
(1996)
Journal of ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
16
-
-
0031378815
-
Replication is not needed: Single database, computationally private information retrieval
-
Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally private information retrieval. In: Proc. FOCS 1997, pp. 364-373 (1997)
-
(1997)
Proc. FOCS 1997
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
17
-
-
33645970169
-
-
Lipmaa, H.: An oblivious transfer protocol with log-squared communication. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, 3650, pp. 314-328. Springer, Heidelberg (2005)
-
Lipmaa, H.: An oblivious transfer protocol with log-squared communication. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 314-328. Springer, Heidelberg (2005)
-
-
-
-
18
-
-
23944469009
-
-
Park, D.J., Kim, K., Lee, P.J.: Public Key Encryption with Conjunctive Field Keyword Search. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, 3325, pp. 73-86. Springer, Heidelberg (2005)
-
Park, D.J., Kim, K., Lee, P.J.: Public Key Encryption with Conjunctive Field Keyword Search. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 73-86. Springer, Heidelberg (2005)
-
-
-
-
19
-
-
0033705124
-
Practical Techniques for Searches on Encrypted Data
-
Song, D., Wagner, D., Perrig. A.: Practical Techniques for Searches on Encrypted Data. In: Proc. IEEE Symposium on Security and Privacy, S&P 2000, pp. 44-55 (2000)
-
(2000)
Proc. IEEE Symposium on Security and Privacy, S&P
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
20
-
-
41549115201
-
-
Yang, Z, Zhong, S, Wright, R.N, Privacy-Preserving Queries on Encrypted Data, Proc
-
Yang, Z., Zhong, S., Wright, R.N.: Privacy-Preserving Queries on Encrypted Data, Proc.
-
-
-
|