메뉴 건너뛰기




Volumn 5037 LNCS, Issue , 2008, Pages 373-391

Restricted queries over an encrypted index with applications to regulatory compliance

Author keywords

[No Author keywords available]

Indexed keywords

APPLIED CRYPTOGRAPHY; ATTRIBUTE-BASED ENCRYPTION; FORMAL SECURITY; HEIDELBERG (CO); INTERNATIONAL CONFERENCES; LARGE DATABASES; SECURE DELETION; SPRINGER (CO); STORAGE TECHNOLOGIES;

EID: 45749087352     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-68914-0_23     Document Type: Conference Paper
Times cited : (7)

References (34)
  • 5
    • 45749144747 scopus 로고    scopus 로고
    • IBM Corporation: IBM TotalStorage DR550 (2006), http://www-03.ibm.com/ systems/storage/index.html
    • (2006) , vol.DR550
    • TotalStorage, I.B.M.1
  • 7
    • 85054431103 scopus 로고    scopus 로고
    • Trustworthy keyword search for regulatory-compliant records retention
    • Dayal, U, Whang, K.Y, Lomet, D, Alonso, G, Lohman, G, Kersten, M, Cha, S.K, Kim, Y.K, eds, VLDB Endowment, September
    • Mitra, S., Hsu, W.W., Winslett, M.: Trustworthy keyword search for regulatory-compliant records retention. In: Dayal, U., Whang, K.Y., Lomet, D., Alonso, G., Lohman, G., Kersten, M., Cha, S.K., Kim, Y.K. (eds.) Conference on Very Large Data Bases, VLDB Endowment, September 2006, pp. 1001-1015 (2006)
    • (2006) Conference on Very Large Data Bases , pp. 1001-1015
    • Mitra, S.1    Hsu, W.W.2    Winslett, M.3
  • 10
    • 29844432195 scopus 로고    scopus 로고
    • Fossilized index: The linchpin of trustworthy non-alterable electronic records
    • ACM, New York
    • Zhu, Q., Hsu, W.W.: Fossilized index: the linchpin of trustworthy non-alterable electronic records. In: ACM SIGMOD International Conference on Management of Data, pp. 395-406. ACM, New York (2005)
    • (2005) ACM SIGMOD International Conference on Management of Data , pp. 395-406
    • Zhu, Q.1    Hsu, W.W.2
  • 11
    • 43349099044 scopus 로고    scopus 로고
    • Mitra, S., Winslett, M., Borisov, N.: Deleting index entries from compliance storage. In: Kemper, A. (ed.) Conference on Extending Database Technology (March 2008)
    • Mitra, S., Winslett, M., Borisov, N.: Deleting index entries from compliance storage. In: Kemper, A. (ed.) Conference on Extending Database Technology (March 2008)
  • 12
    • 34547273527 scopus 로고    scopus 로고
    • Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: Wright, R., di Vimercati, S.D.C. (eds.) ACM Conference on Computer and Communications Security, October 2006, pp. 89-98. ACM, New York (2006)
    • Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: Wright, R., di Vimercati, S.D.C. (eds.) ACM Conference on Computer and Communications Security, October 2006, pp. 89-98. ACM, New York (2006)
  • 13
    • 84968502759 scopus 로고
    • A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
    • Frey, G., Rück, H.: A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Mathematics of Computation 62(206), 865-874 (1994)
    • (1994) Mathematics of Computation , vol.62 , Issue.206 , pp. 865-874
    • Frey, G.1    Rück, H.2
  • 14
  • 16
    • 35248851617 scopus 로고    scopus 로고
    • Correlation-resistant storage via keyword-searchable encryption. Cryptology ePrint Archive
    • Report 2005/417
    • Ballard, L., Green, M., de Medeiros, B., Monrose, F.: Correlation-resistant storage via keyword-searchable encryption. Cryptology ePrint Archive, Report 2005/417 (2005), http://eprint.iacr.org/
    • (2005)
    • Ballard, L.1    Green, M.2    de Medeiros, B.3    Monrose, F.4
  • 17
    • 23944461491 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • Joux, A.: A one round protocol for tripartite Diffie-Hellman. Journal of Cryptology 17(4) (2004)
    • (2004) Journal of Cryptology , vol.17 , Issue.4
    • Joux, A.1
  • 18
    • 3042683432 scopus 로고    scopus 로고
    • Message authentication using hash functions: The HMAC construction
    • Bellare, M., Canetti, R., Krawczyk, H.: Message authentication using hash functions: the HMAC construction. CryptoBytes 2(1), 12-15 (1996)
    • (1996) CryptoBytes , vol.2 , Issue.1 , pp. 12-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 20
    • 34247363892 scopus 로고    scopus 로고
    • Secure indexes. Cryptology ePrint Archive
    • Report 2003/216
    • Goh, E.J.: Secure indexes. Cryptology ePrint Archive, Report 2003/216 (2003), http://eprint.iacr.org/
    • (2003)
    • Goh, E.J.1
  • 21
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 23
    • 45749126073 scopus 로고    scopus 로고
    • Golle, P., Staddon, J., Waters, B.: Secure Conjunctive Keyword Search over Encrypted Data. In: International Conference on Applied Cryptography and Network Security (June 2004)
    • Golle, P., Staddon, J., Waters, B.: Secure Conjunctive Keyword Search over Encrypted Data. In: International Conference on Applied Cryptography and Network Security (June 2004)
  • 24
    • 33646736337 scopus 로고    scopus 로고
    • Achieving Efficient Conjunctive Keyword Searches over Encrypted Data
    • Qing, S, Mao, W, López, J, Wang, G, eds, ICICS 2005, Springer, Heidelberg
    • Ballard, L., Kamara, S., Monrose, F.: Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 414-426. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3783 , pp. 414-426
    • Ballard, L.1    Kamara, S.2    Monrose, F.3
  • 26
    • 33746214783 scopus 로고    scopus 로고
    • Byun, J., Lee, D., Lim, J.: Efficient Conjunctive Keyword Search on Encrypted Data Storage System. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, 4043, pp. 184-196. Springer, Heidelberg (2006)
    • Byun, J., Lee, D., Lim, J.: Efficient Conjunctive Keyword Search on Encrypted Data Storage System. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 184-196. Springer, Heidelberg (2006)
  • 27
    • 50049095455 scopus 로고    scopus 로고
    • Hwang, Y., Lee, P.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, 4575, Springer, Heidelberg (2007)
    • Hwang, Y., Lee, P.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, Springer, Heidelberg (2007)
  • 29
    • 45749140863 scopus 로고    scopus 로고
    • Chase, M.: Multi-authority attribute-based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, Springer, Heidelberg (2007)
    • Chase, M.: Multi-authority attribute-based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, Springer, Heidelberg (2007)
  • 31
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 33
    • 45749124402 scopus 로고    scopus 로고
    • Kapadia, A., Tsang, P., Smith, S.: Attribute-based publishing with hidden credentials and hidden policies. In: Arbaugh, W., Cowan, C. (eds.) Network and Distributed Systems Security Symposium (March 2007)
    • Kapadia, A., Tsang, P., Smith, S.: Attribute-based publishing with hidden credentials and hidden policies. In: Arbaugh, W., Cowan, C. (eds.) Network and Distributed Systems Security Symposium (March 2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.