메뉴 건너뛰기




Volumn 4991 LNCS, Issue , 2008, Pages 71-85

Private query on encrypted data in multi-user settings

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATABASE SYSTEMS; SECURITY OF DATA; USER INTERFACES;

EID: 41549164259     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-79104-1_6     Document Type: Conference Paper
Times cited : (184)

References (20)
  • 1
    • 33745134401 scopus 로고    scopus 로고
    • Searchable Encryption Revisite: Consistency Properties, Ration to Anonymous IBE, and Extensions
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable Encryption Revisite: Consistency Properties, Ration to Anonymous IBE, and Extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 205-222
    • Abdalla, M.1    Bellare, M.2    Catalano, D.3    Kiltz, E.4    Kohno, T.5    Lange, T.6    Lee, J.7    Neven, G.8    Paillier, P.9    Shi, H.10
  • 2
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 3
    • 0036957230 scopus 로고    scopus 로고
    • 1/(2k-21)) barrier for information-theoretic private information retrieval. In: Proc. FOCS 2002, pp. 261-270 (2002)
    • 1/(2k-21)) barrier for information-theoretic private information retrieval. In: Proc. FOCS 2002, pp. 261-270 (2002)
  • 4
    • 33646736337 scopus 로고    scopus 로고
    • Achieving Efficient Conjunctive Keyword Searches over Encrypted Data
    • Qing, S, Mao, W, López, J, Wang, G, eds, ICICS 2005, Springer, Heidelberg
    • Ballard, L., Kamara, S., Monrose, F.: Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 414-426. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3783 , pp. 414-426
    • Ballard, L.1    Kamara, S.2    Monrose, F.3
  • 5
    • 0027726717 scopus 로고    scopus 로고
    • Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. ACM Conference on Computer and Communications Security, CCS 1993, pp. 62-73 (1993)
    • Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. ACM Conference on Computer and Communications Security, CCS 1993, pp. 62-73 (1993)
  • 6
    • 84946840347 scopus 로고    scopus 로고
    • Short Signatures from the Weil Pairing
    • Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS. vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 7
  • 10
    • 26444507272 scopus 로고    scopus 로고
    • Chang, Y., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 442-455. Springer, Heidelberg (2005)
    • Chang, Y., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005)
  • 11
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Odlyzko. A.M, ed, CRYPTO 1986, Springer. Heidelberg
    • Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko. A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer. Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 12
    • 33244488406 scopus 로고    scopus 로고
    • Goh, E.: Secure Indexes (2003), http://crypto.stanford.edu/~eujin/papers/ secureindex/secureindex.pdf
    • (2003) Secure Indexes
    • Goh, E.1
  • 14
    • 0030149547 scopus 로고    scopus 로고
    • Software Protection and Simulation on oblivious RAMs
    • Goldreich, O., Ostrovsky, R.: Software Protection and Simulation on oblivious RAMs. Journal of ACM 43(3), 431-473 (1996)
    • (1996) Journal of ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 16
    • 0031378815 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally private information retrieval
    • Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally private information retrieval. In: Proc. FOCS 1997, pp. 364-373 (1997)
    • (1997) Proc. FOCS 1997 , pp. 364-373
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 17
    • 33645970169 scopus 로고    scopus 로고
    • Lipmaa, H.: An oblivious transfer protocol with log-squared communication. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, 3650, pp. 314-328. Springer, Heidelberg (2005)
    • Lipmaa, H.: An oblivious transfer protocol with log-squared communication. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 314-328. Springer, Heidelberg (2005)
  • 18
    • 23944469009 scopus 로고    scopus 로고
    • Park, D.J., Kim, K., Lee, P.J.: Public Key Encryption with Conjunctive Field Keyword Search. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, 3325, pp. 73-86. Springer, Heidelberg (2005)
    • Park, D.J., Kim, K., Lee, P.J.: Public Key Encryption with Conjunctive Field Keyword Search. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 73-86. Springer, Heidelberg (2005)
  • 20
    • 41549115201 scopus 로고    scopus 로고
    • Yang, Z, Zhong, S, Wright, R.N, Privacy-Preserving Queries on Encrypted Data, Proc
    • Yang, Z., Zhong, S., Wright, R.N.: Privacy-Preserving Queries on Encrypted Data, Proc.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.