메뉴 건너뛰기




Volumn 5094 LNCS, Issue , 2008, Pages 127-143

Shared and searchable encrypted data for untrusted servers

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; INDUSTRIAL ECONOMICS; KEYS (FOR LOCKS); MANAGEMENT INFORMATION SYSTEMS; OCCUPATIONAL RISKS; ONLINE SEARCHING; SERVERS; INFORMATION MANAGEMENT; MOBILE SECURITY; QUERY PROCESSING; SEARCH ENGINES;

EID: 50249137692     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70567-3_10     Document Type: Conference Paper
Times cited : (95)

References (26)
  • 1
    • 50249175674 scopus 로고    scopus 로고
    • Blackwood, J.: Is storage outsourcing a viable alternative? http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2851289,00.html
    • Blackwood, J.: Is storage outsourcing a viable alternative? http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2851289,00.html
  • 4
    • 33750247597 scopus 로고    scopus 로고
    • Privacy-Preserving Queries on Encrypted Data
    • Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
    • Yang, Z., Zhong, S., Wright, R.N.: Privacy-Preserving Queries on Encrypted Data. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 479-495. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4189 , pp. 479-495
    • Yang, Z.1    Zhong, S.2    Wright, R.N.3
  • 5
    • 34247363892 scopus 로고    scopus 로고
    • Secure indexes. Cryptology ePrint Archive
    • Report 2003/216
    • Goh, E.J.: Secure indexes. Cryptology ePrint Archive, Report 2003/216 (2003), http://eprint.iacr.org/2003/216/
    • (2003)
    • Goh, E.J.1
  • 6
    • 0036361105 scopus 로고    scopus 로고
    • Executing sql over encrypted data in the database-service-provider model
    • Hacigümüs, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing sql over encrypted data in the database-service-provider model. In: SIGMOD Conference, pp. 216-227 (2002)
    • (2002) SIGMOD Conference , pp. 216-227
    • Hacigümüs, H.1    Iyer, B.R.2    Li, C.3    Mehrotra, S.4
  • 9
    • 85065578926 scopus 로고    scopus 로고
    • A privacy-preserving index for range queries
    • Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: VLDB, pp. 720-731 (2004)
    • (2004) VLDB , pp. 720-731
    • Hore, B.1    Mehrotra, S.2    Tsudik, G.3
  • 10
    • 35048901123 scopus 로고    scopus 로고
    • Public Key Encryption with Keyword Search
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Crescenzo, G.D.2    Ostrovsky, R.3    Persiano, G.4
  • 12
    • 84957718934 scopus 로고    scopus 로고
    • Divertible Protocols and Atomic Proxy Cryptography
    • Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
    • Blaze, M., Bleumer, G., Strauss, M.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 13
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469-472 (1985)
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 14
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120-126 (1978)
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 16
    • 50249151637 scopus 로고    scopus 로고
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS (2005)
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS (2005)
  • 17
    • 50249130962 scopus 로고    scopus 로고
    • Kapadia, A., Tsang, P.P., Smith, S.W.: Attribute-based publishing with hidden credentials and hidden policies. In: NDSS (2007)
    • Kapadia, A., Tsang, P.P., Smith, S.W.: Attribute-based publishing with hidden credentials and hidden policies. In: NDSS (2007)
  • 18
    • 50249087213 scopus 로고    scopus 로고
    • Ivan, A.A., Dodis, Y.: Proxy cryptography revisited. In: NDSS (2003)
    • Ivan, A.A., Dodis, Y.: Proxy cryptography revisited. In: NDSS (2003)
  • 20
    • 0343349510 scopus 로고
    • A "weak" privacy protocol using the rsa crypto algorithm
    • Simmons, G.J.: A "weak" privacy protocol using the rsa crypto algorithm. Cryptologia 7(2), 180-182 (1983)
    • (1983) Cryptologia , vol.7 , Issue.2 , pp. 180-182
    • Simmons, G.J.1
  • 21
    • 0008538346 scopus 로고
    • A further weakness in the common modulus protocol for the rsa cryptoalgorithm
    • Delaurentis, J.M.: A further weakness in the common modulus protocol for the rsa cryptoalgorithm. Cryptologia 8(3), 253-259 (1984)
    • (1984) Cryptologia , vol.8 , Issue.3 , pp. 253-259
    • Delaurentis, J.M.1
  • 22
    • 84948986458 scopus 로고
    • Optimal Asymmetric Encryption
    • De Santis, A, ed, EUROCRYPT 1994, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Optimal Asymmetric Encryption. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 92-111. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 23
    • 84880853825 scopus 로고    scopus 로고
    • Secure under the RSA Assumption
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Fujisaki, E., Okamoto, T., Pointcheval, D., Stern, J.: RSA-OAEP Is Secure under the RSA Assumption. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 260-274. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 260-274
    • Fujisaki, E.1    Okamoto, T.2    Pointcheval, D.3    Stern, J.4    RSA-OAEP, I.5
  • 25
    • 1642602228 scopus 로고    scopus 로고
    • Computationally Private Information Retrieval with Polylogarithmic Communication
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Cachin, C., Micali, S., Stadler, M.: Computationally Private Information Retrieval with Polylogarithmic Communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402-414. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 26
    • 26444512068 scopus 로고    scopus 로고
    • Single-Database Private Information Retrieval with Constant Communication Rate
    • Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Gentry, C., Ramzan, Z.: Single-Database Private Information Retrieval with Constant Communication Rate. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 803-815. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 803-815
    • Gentry, C.1    Ramzan, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.