-
1
-
-
33745134401
-
Searhable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searhable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
24144432124
-
-
Baek, J., Safavi-Naini, R., Susilo, W.: Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 380-397. Springer, Heidelberg (2005)
-
Baek, J., Safavi-Naini, R., Susilo, W.: Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 380-397. Springer, Heidelberg (2005)
-
-
-
-
3
-
-
50049114427
-
-
Ballard, L., Green, M., De Medeiros, B., Monrose, F.: Correlation Resistant Storage. Technical Report TR-SP-BGMM-050507, Johns Hopkins University Department of Computer Science (2005)
-
Ballard, L., Green, M., De Medeiros, B., Monrose, F.: Correlation Resistant Storage. Technical Report TR-SP-BGMM-050507, Johns Hopkins University Department of Computer Science (2005)
-
-
-
-
4
-
-
33646736337
-
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data
-
Qing, S, Mao, W, Lopez, J, Wang, G, eds, ICICS 2005, Springer, Heidelberg
-
Ballard, L., Kamara, S., Monrose, F.: Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. In: Qing, S., Mao, W., Lopez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 414-426. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3783
, pp. 414-426
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
-
5
-
-
84937428623
-
Efficient Algorithm for Pairing-based Cryptosystems
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient Algorithm for Pairing-based Cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354-369. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 354-369
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
6
-
-
35048900981
-
-
Barreto, P.S.L.M., Lynn, B., Scott, M.: On The Selection of Pairing-friendly Groups. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, 3006, pp. 17- 25. Springer, Heidelberg (2003)
-
Barreto, P.S.L.M., Lynn, B., Scott, M.: On The Selection of Pairing-friendly Groups. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 17- 25. Springer, Heidelberg (2003)
-
-
-
-
7
-
-
84974622621
-
Extended Notions of Security for Multi-cast Public Key Cryptosystems
-
Welzl, E, Montanari, U, Rolim, J.D.P, eds, ICALP 2000, Springer, Heidelberg
-
Baudron, O., Pointcheval, D., Stern, J.: Extended Notions of Security for Multi-cast Public Key Cryptosystems. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol. 1853, pp. 499-511. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1853
, pp. 499-511
-
-
Baudron, O.1
Pointcheval, D.2
Stern, J.3
-
8
-
-
84948957152
-
Public-key Encryption in a Multi-User Setting: Security Proofs and Improvements
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Bellare, M., Boldyreva, A., Micali, S.: Public-key Encryption in a Multi-User Setting: Security Proofs and Improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259-274. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
-
9
-
-
0842283854
-
-
Bellare, M., Boldyreva, A., Staddon, J.: Randomness Re-use in Multi-recepient Encryption Schemes. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 85-99. Springer, Heidelberg (2003)
-
Bellare, M., Boldyreva, A., Staddon, J.: Randomness Re-use in Multi-recepient Encryption Schemes. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 85-99. Springer, Heidelberg (2003)
-
-
-
-
10
-
-
35048887476
-
Short Group Signatrues
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short Group Signatrues. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
11
-
-
35048901123
-
Public Key Encryption with Keywrod Search
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keywrod Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004, LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
12
-
-
84874324906
-
Identity based Encryption from the Weil Pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
13
-
-
24144433396
-
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 325-342. Springer, Heidelberg (2005)
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-342. Springer, Heidelberg (2005)
-
-
-
-
14
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
15
-
-
23044435711
-
Short Signatures from the Weil Pairing
-
Extended abstract in ASIACRYPT 2001, LNCS, 2248, pp. 514-532, Springer, Heidelberg, 2001
-
Boneh, D., Shacham, H., Lynn, B.: Short Signatures from the Weil Pairing. Journal of Cryptology 17(4), 297-319 (2004) (Extended abstract in ASIACRYPT 2001, LNCS, vol. 2248, pp. 514-532, Springer, Heidelberg, 2001)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Shacham, H.2
Lynn, B.3
-
16
-
-
38049045519
-
-
Boneh, D., Waters, B.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 535 554. Springer, Heidelberg (2007)
-
Boneh, D., Waters, B.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535 554. Springer, Heidelberg (2007)
-
-
-
-
17
-
-
33746214783
-
-
Byun, J.W., Lee, D.H., Lim, J.: Efficient Conjunctive Keyword Searches on Encrypted Data Storage System. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, 4043, pp. 184-196. Springer, Heidelberg (2004)
-
Byun, J.W., Lee, D.H., Lim, J.: Efficient Conjunctive Keyword Searches on Encrypted Data Storage System. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 184-196. Springer, Heidelberg (2004)
-
-
-
-
18
-
-
26444507272
-
-
Chang, Y.C., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 442 455. Springer, Heidelberg (2005)
-
Chang, Y.C., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442 455. Springer, Heidelberg (2005)
-
-
-
-
19
-
-
34547240272
-
-
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. In: ACM CCS 2006, pp. 79-88. ACM Press, New York (2007)
-
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. In: ACM CCS 2006, pp. 79-88. ACM Press, New York (2007)
-
-
-
-
20
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information on Information Theory 31, 469-472 (1985)
-
(1985)
IEEE Transactions on Information on Information Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
21
-
-
34247363892
-
Secure indexes. Cryptology ePrint Archive
-
Report 2003/216
-
Goh, E.-J.: Secure indexes. Cryptology ePrint Archive, Report 2003/216 (2003)
-
(2003)
-
-
Goh, E.-J.1
-
22
-
-
33745120364
-
-
Golle, P., Staddon, J., Waters, B.: Secure Conjunctive Keyword Search Over Encrypted Data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004, LNCS, 3089, pp. 31 45. Springer, Heidelberg (2004)
-
Golle, P., Staddon, J., Waters, B.: Secure Conjunctive Keyword Search Over Encrypted Data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004, LNCS, vol. 3089, pp. 31 45. Springer, Heidelberg (2004)
-
-
-
-
23
-
-
33745574075
-
-
Kiltz, E.: Chosen-Ciphertext Security from Tag-Based Encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 581-600. Springer, Heidelberg (2006)
-
Kiltz, E.: Chosen-Ciphertext Security from Tag-Based Encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 581-600. Springer, Heidelberg (2006)
-
-
-
-
24
-
-
84958971364
-
-
Kurosawa, K.: Multi-Recepient Public-Key Encryption with Shortend Ciphertext. In: Naccache, D., Paillier, P. (eels.) PKC 2002. LNCS, 2274, pp. 48-63. Springer, Heidelberg (2002)
-
Kurosawa, K.: Multi-Recepient Public-Key Encryption with Shortend Ciphertext. In: Naccache, D., Paillier, P. (eels.) PKC 2002. LNCS, vol. 2274, pp. 48-63. Springer, Heidelberg (2002)
-
-
-
-
25
-
-
0000653210
-
Selecting cryptographic key sizes
-
Lenstra, A., Verheul, E.R.: Selecting cryptographic key sizes. Journal of Cryptology 14(4), 255-293 (2001)
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.1
Verheul, E.R.2
-
26
-
-
23944469009
-
-
Park, D.J., Kim, K., Lee, P.J.: Public Key Encryption with Conjunctive Field Keyword Search, In: Lim, C.H., Yung, M. (eds.) WISA 2004, LNCS, 3325, pp. 73-86. Springer, Heidelberg (2004)
-
Park, D.J., Kim, K., Lee, P.J.: Public Key Encryption with Conjunctive Field Keyword Search, In: Lim, C.H., Yung, M. (eds.) WISA 2004, LNCS, vol. 3325, pp. 73-86. Springer, Heidelberg (2004)
-
-
-
-
27
-
-
84958550160
-
The Weil and Tate Pairing as Building Blocks for Public Key Cryptosystems
-
Fieker, C, Kohel, D.R, eds, Algorithmic Number Theory, Springer, Heidelberg
-
Joux, A.: The Weil and Tate Pairing as Building Blocks for Public Key Cryptosystems. In: Fieker, C., Kohel, D.R. (eds.) Algorithmic Number Theory. LNCS, vol. 2369, pp. 20 32. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2369
, pp. 20-32
-
-
Joux, A.1
-
28
-
-
0035336179
-
New Explicit Conditions of Elliptic Curve Traces for FR-Reduction
-
Miyaji, A., Nakabayashi, M., Takaute;no, S.: New Explicit Conditions of Elliptic Curve Traces for FR-Reduction. IEICE Trans. Fundamentals E84-A(5), 1234-1243 (2001)
-
(2001)
IEICE Trans. Fundamentals
, vol.E84-A
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takaute3
no, S.4
-
29
-
-
0018545449
-
How to Share a Secret
-
Shamir, A.: How to Share a Secret. Communications of the ACM 22, 612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
30
-
-
0033705124
-
Practical Techniques for Searching on Encrypted Data
-
IEEE Computer Society Press, Los Alamitos
-
Song, D., Wagner, D., Perrig, A.: Practical Techniques for Searching on Encrypted Data. In: IEEE Symposium on Research in Security and Privacy 2000, pp. 44-55. IEEE Computer Society Press, Los Alamitos (2000)
-
(2000)
IEEE Symposium on Research in Security and Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
31
-
-
77952589508
-
Building an Encrypted and Searchable Audit Log
-
The internet society
-
Waters, B., Balfanz, D., Durfee, G., Smetters, D.: Building an Encrypted and Searchable Audit Log. In: NDSS 2004, The internet society (2004)
-
(2004)
NDSS
-
-
Waters, B.1
Balfanz, D.2
Durfee, G.3
Smetters, D.4
|