메뉴 건너뛰기




Volumn 4575 LNCS, Issue , 2007, Pages 2-22

Public key encryption with conjunctive keyword search and its extension to a multi-user system

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; INDUSTRIAL ECONOMICS; ONLINE SEARCHING;

EID: 50049095455     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73489-5_2     Document Type: Conference Paper
Times cited : (357)

References (31)
  • 1
    • 33745134401 scopus 로고    scopus 로고
    • Searhable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searhable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 205-222
    • Abdalla, M.1    Bellare, M.2    Catalano, D.3    Kiltz, E.4    Kohno, T.5    Lange, T.6    Malone-Lee, J.7    Neven, G.8    Paillier, P.9    Shi, H.10
  • 2
    • 24144432124 scopus 로고    scopus 로고
    • Baek, J., Safavi-Naini, R., Susilo, W.: Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 380-397. Springer, Heidelberg (2005)
    • Baek, J., Safavi-Naini, R., Susilo, W.: Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 380-397. Springer, Heidelberg (2005)
  • 3
    • 50049114427 scopus 로고    scopus 로고
    • Ballard, L., Green, M., De Medeiros, B., Monrose, F.: Correlation Resistant Storage. Technical Report TR-SP-BGMM-050507, Johns Hopkins University Department of Computer Science (2005)
    • Ballard, L., Green, M., De Medeiros, B., Monrose, F.: Correlation Resistant Storage. Technical Report TR-SP-BGMM-050507, Johns Hopkins University Department of Computer Science (2005)
  • 4
    • 33646736337 scopus 로고    scopus 로고
    • Achieving Efficient Conjunctive Keyword Searches over Encrypted Data
    • Qing, S, Mao, W, Lopez, J, Wang, G, eds, ICICS 2005, Springer, Heidelberg
    • Ballard, L., Kamara, S., Monrose, F.: Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. In: Qing, S., Mao, W., Lopez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 414-426. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3783 , pp. 414-426
    • Ballard, L.1    Kamara, S.2    Monrose, F.3
  • 5
    • 84937428623 scopus 로고    scopus 로고
    • Efficient Algorithm for Pairing-based Cryptosystems
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient Algorithm for Pairing-based Cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354-369. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 354-369
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3    Scott, M.4
  • 6
    • 35048900981 scopus 로고    scopus 로고
    • Barreto, P.S.L.M., Lynn, B., Scott, M.: On The Selection of Pairing-friendly Groups. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, 3006, pp. 17- 25. Springer, Heidelberg (2003)
    • Barreto, P.S.L.M., Lynn, B., Scott, M.: On The Selection of Pairing-friendly Groups. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 17- 25. Springer, Heidelberg (2003)
  • 7
    • 84974622621 scopus 로고    scopus 로고
    • Extended Notions of Security for Multi-cast Public Key Cryptosystems
    • Welzl, E, Montanari, U, Rolim, J.D.P, eds, ICALP 2000, Springer, Heidelberg
    • Baudron, O., Pointcheval, D., Stern, J.: Extended Notions of Security for Multi-cast Public Key Cryptosystems. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol. 1853, pp. 499-511. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1853 , pp. 499-511
    • Baudron, O.1    Pointcheval, D.2    Stern, J.3
  • 8
    • 84948957152 scopus 로고    scopus 로고
    • Public-key Encryption in a Multi-User Setting: Security Proofs and Improvements
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Bellare, M., Boldyreva, A., Micali, S.: Public-key Encryption in a Multi-User Setting: Security Proofs and Improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259-274. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 9
    • 0842283854 scopus 로고    scopus 로고
    • Bellare, M., Boldyreva, A., Staddon, J.: Randomness Re-use in Multi-recepient Encryption Schemes. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 85-99. Springer, Heidelberg (2003)
    • Bellare, M., Boldyreva, A., Staddon, J.: Randomness Re-use in Multi-recepient Encryption Schemes. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 85-99. Springer, Heidelberg (2003)
  • 10
    • 35048887476 scopus 로고    scopus 로고
    • Short Group Signatrues
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short Group Signatrues. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 11
    • 35048901123 scopus 로고    scopus 로고
    • Public Key Encryption with Keywrod Search
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keywrod Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004, LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 12
    • 84874324906 scopus 로고    scopus 로고
    • Identity based Encryption from the Weil Pairing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 13
    • 24144433396 scopus 로고    scopus 로고
    • Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 325-342. Springer, Heidelberg (2005)
    • Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-342. Springer, Heidelberg (2005)
  • 14
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 15
    • 23044435711 scopus 로고    scopus 로고
    • Short Signatures from the Weil Pairing
    • Extended abstract in ASIACRYPT 2001, LNCS, 2248, pp. 514-532, Springer, Heidelberg, 2001
    • Boneh, D., Shacham, H., Lynn, B.: Short Signatures from the Weil Pairing. Journal of Cryptology 17(4), 297-319 (2004) (Extended abstract in ASIACRYPT 2001, LNCS, vol. 2248, pp. 514-532, Springer, Heidelberg, 2001)
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Shacham, H.2    Lynn, B.3
  • 16
    • 38049045519 scopus 로고    scopus 로고
    • Boneh, D., Waters, B.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 535 554. Springer, Heidelberg (2007)
    • Boneh, D., Waters, B.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535 554. Springer, Heidelberg (2007)
  • 17
    • 33746214783 scopus 로고    scopus 로고
    • Byun, J.W., Lee, D.H., Lim, J.: Efficient Conjunctive Keyword Searches on Encrypted Data Storage System. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, 4043, pp. 184-196. Springer, Heidelberg (2004)
    • Byun, J.W., Lee, D.H., Lim, J.: Efficient Conjunctive Keyword Searches on Encrypted Data Storage System. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 184-196. Springer, Heidelberg (2004)
  • 18
    • 26444507272 scopus 로고    scopus 로고
    • Chang, Y.C., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 442 455. Springer, Heidelberg (2005)
    • Chang, Y.C., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442 455. Springer, Heidelberg (2005)
  • 19
    • 34547240272 scopus 로고    scopus 로고
    • Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. In: ACM CCS 2006, pp. 79-88. ACM Press, New York (2007)
    • Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. In: ACM CCS 2006, pp. 79-88. ACM Press, New York (2007)
  • 20
    • 84874800178 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information on Information Theory 31, 469-472 (1985)
    • (1985) IEEE Transactions on Information on Information Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 21
    • 34247363892 scopus 로고    scopus 로고
    • Secure indexes. Cryptology ePrint Archive
    • Report 2003/216
    • Goh, E.-J.: Secure indexes. Cryptology ePrint Archive, Report 2003/216 (2003)
    • (2003)
    • Goh, E.-J.1
  • 22
    • 33745120364 scopus 로고    scopus 로고
    • Golle, P., Staddon, J., Waters, B.: Secure Conjunctive Keyword Search Over Encrypted Data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004, LNCS, 3089, pp. 31 45. Springer, Heidelberg (2004)
    • Golle, P., Staddon, J., Waters, B.: Secure Conjunctive Keyword Search Over Encrypted Data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004, LNCS, vol. 3089, pp. 31 45. Springer, Heidelberg (2004)
  • 23
    • 33745574075 scopus 로고    scopus 로고
    • Kiltz, E.: Chosen-Ciphertext Security from Tag-Based Encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 581-600. Springer, Heidelberg (2006)
    • Kiltz, E.: Chosen-Ciphertext Security from Tag-Based Encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 581-600. Springer, Heidelberg (2006)
  • 24
    • 84958971364 scopus 로고    scopus 로고
    • Kurosawa, K.: Multi-Recepient Public-Key Encryption with Shortend Ciphertext. In: Naccache, D., Paillier, P. (eels.) PKC 2002. LNCS, 2274, pp. 48-63. Springer, Heidelberg (2002)
    • Kurosawa, K.: Multi-Recepient Public-Key Encryption with Shortend Ciphertext. In: Naccache, D., Paillier, P. (eels.) PKC 2002. LNCS, vol. 2274, pp. 48-63. Springer, Heidelberg (2002)
  • 25
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • Lenstra, A., Verheul, E.R.: Selecting cryptographic key sizes. Journal of Cryptology 14(4), 255-293 (2001)
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.1    Verheul, E.R.2
  • 26
    • 23944469009 scopus 로고    scopus 로고
    • Park, D.J., Kim, K., Lee, P.J.: Public Key Encryption with Conjunctive Field Keyword Search, In: Lim, C.H., Yung, M. (eds.) WISA 2004, LNCS, 3325, pp. 73-86. Springer, Heidelberg (2004)
    • Park, D.J., Kim, K., Lee, P.J.: Public Key Encryption with Conjunctive Field Keyword Search, In: Lim, C.H., Yung, M. (eds.) WISA 2004, LNCS, vol. 3325, pp. 73-86. Springer, Heidelberg (2004)
  • 27
    • 84958550160 scopus 로고    scopus 로고
    • The Weil and Tate Pairing as Building Blocks for Public Key Cryptosystems
    • Fieker, C, Kohel, D.R, eds, Algorithmic Number Theory, Springer, Heidelberg
    • Joux, A.: The Weil and Tate Pairing as Building Blocks for Public Key Cryptosystems. In: Fieker, C., Kohel, D.R. (eds.) Algorithmic Number Theory. LNCS, vol. 2369, pp. 20 32. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2369 , pp. 20-32
    • Joux, A.1
  • 28
    • 0035336179 scopus 로고    scopus 로고
    • New Explicit Conditions of Elliptic Curve Traces for FR-Reduction
    • Miyaji, A., Nakabayashi, M., Takaute;no, S.: New Explicit Conditions of Elliptic Curve Traces for FR-Reduction. IEICE Trans. Fundamentals E84-A(5), 1234-1243 (2001)
    • (2001) IEICE Trans. Fundamentals , vol.E84-A , Issue.5 , pp. 1234-1243
    • Miyaji, A.1    Nakabayashi, M.2    Takaute3    no, S.4
  • 29
  • 30
    • 0033705124 scopus 로고    scopus 로고
    • Practical Techniques for Searching on Encrypted Data
    • IEEE Computer Society Press, Los Alamitos
    • Song, D., Wagner, D., Perrig, A.: Practical Techniques for Searching on Encrypted Data. In: IEEE Symposium on Research in Security and Privacy 2000, pp. 44-55. IEEE Computer Society Press, Los Alamitos (2000)
    • (2000) IEEE Symposium on Research in Security and Privacy , pp. 44-55
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 31
    • 77952589508 scopus 로고    scopus 로고
    • Building an Encrypted and Searchable Audit Log
    • The internet society
    • Waters, B., Balfanz, D., Durfee, G., Smetters, D.: Building an Encrypted and Searchable Audit Log. In: NDSS 2004, The internet society (2004)
    • (2004) NDSS
    • Waters, B.1    Balfanz, D.2    Durfee, G.3    Smetters, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.