메뉴 건너뛰기




Volumn 4990 LNCS, Issue , 2008, Pages 372-383

Efficient public key encryption with keyword search schemes from pairings

Author keywords

Keyword search; Pairings; Provable secure; Public key encryption

Indexed keywords

INDUSTRIAL ECONOMICS; ONLINE SEARCHING; SECURITY OF DATA;

EID: 54249087643     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-79499-8_29     Document Type: Conference Paper
Times cited : (51)

References (13)
  • 1
    • 35048901123 scopus 로고    scopus 로고
    • Public Key Encryption with Keyword Search
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 2
    • 33745134401 scopus 로고    scopus 로고
    • Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 205-222
    • Abdalla, M.1    Bellare, M.2    Catalano, D.3    Kiltz, E.4    Kohno, T.5    Lange, T.6    Malone-Lee, J.7    Neven, G.8    Paillier, P.9    Shi, H.10
  • 4
    • 54249101916 scopus 로고    scopus 로고
    • Public Key Encryption with Keyword Search Revisited. Available on Cryptology ePrint Archive
    • Report 2005/119
    • Baek, J., Safiavi-Naini, R., Susilo, W.: Public Key Encryption with Keyword Search Revisited. Available on Cryptology ePrint Archive, Report 2005/119.
    • Baek, J.1    Safiavi-Naini, R.2    Susilo, W.3
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Kilin, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilin, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139
    • Boneh, D.1    Franklin, M.2
  • 6
    • 35048841300 scopus 로고    scopus 로고
    • Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 7
    • 35048854587 scopus 로고    scopus 로고
    • Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, 2947, pp. 277-290. Springer, Heidelberg (2004)
    • Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277-290. Springer, Heidelberg (2004)
  • 8
    • 33645585449 scopus 로고    scopus 로고
    • ID based Cryptosystems with Pairing on Elliptic Curve. Cryptology ePrint Archive
    • Report 2003/054
    • Sakai, R., Kasahara, M.: ID based Cryptosystems with Pairing on Elliptic Curve. Cryptology ePrint Archive: Report 2003/054
    • Sakai, R.1    Kasahara, M.2
  • 9
    • 84937428623 scopus 로고    scopus 로고
    • Efficient Algorithms for Pairing-Based Cryptosystems
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Barreto, P., Kim, H., Lynn, B., Scott, M.: Efficient Algorithms for Pairing-Based Cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442
    • Barreto, P.1    Kim, H.2    Lynn, B.3    Scott, M.4
  • 10
    • 0345490614 scopus 로고    scopus 로고
    • p + x + d
    • Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
    • p + x + d. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 111-123. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2894 , pp. 111-123
    • Duursma, I.1    Lee, H.2
  • 11
    • 23044517520 scopus 로고    scopus 로고
    • Sakai, Y., Sakurai, K.: Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, 1841, pp. 59-73. Springer, Heidelberg (2000)
    • Sakai, Y., Sakurai, K.: Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 59-73. Springer, Heidelberg (2000)
  • 12
    • 33645585449 scopus 로고    scopus 로고
    • ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive
    • Report 2003/054
    • Sakai, R., Kasahara, M.: ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive, Report 2003/054
    • Sakai, R.1    Kasahara, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.