-
1
-
-
35048901123
-
Public Key Encryption with Keyword Search
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
2
-
-
33745134401
-
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
3
-
-
77952589508
-
Building an Encrypted and Searchable Audit Log
-
Waters, B., Balfanz, D., Durfee, G., Smetters, D.: Building an Encrypted and Searchable Audit Log. In: Network and Distributed System Security Symposium NDSS (2004)
-
(2004)
Network and Distributed System Security Symposium NDSS
-
-
Waters, B.1
Balfanz, D.2
Durfee, G.3
Smetters, D.4
-
4
-
-
54249101916
-
Public Key Encryption with Keyword Search Revisited. Available on Cryptology ePrint Archive
-
Report 2005/119
-
Baek, J., Safiavi-Naini, R., Susilo, W.: Public Key Encryption with Keyword Search Revisited. Available on Cryptology ePrint Archive, Report 2005/119.
-
-
-
Baek, J.1
Safiavi-Naini, R.2
Susilo, W.3
-
5
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Kilin, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilin, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
35048841300
-
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
7
-
-
35048854587
-
-
Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, 2947, pp. 277-290. Springer, Heidelberg (2004)
-
Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277-290. Springer, Heidelberg (2004)
-
-
-
-
8
-
-
33645585449
-
ID based Cryptosystems with Pairing on Elliptic Curve. Cryptology ePrint Archive
-
Report 2003/054
-
Sakai, R., Kasahara, M.: ID based Cryptosystems with Pairing on Elliptic Curve. Cryptology ePrint Archive: Report 2003/054
-
-
-
Sakai, R.1
Kasahara, M.2
-
9
-
-
84937428623
-
Efficient Algorithms for Pairing-Based Cryptosystems
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Barreto, P., Kim, H., Lynn, B., Scott, M.: Efficient Algorithms for Pairing-Based Cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
10
-
-
0345490614
-
p + x + d
-
Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
-
p + x + d. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 111-123. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 111-123
-
-
Duursma, I.1
Lee, H.2
-
11
-
-
23044517520
-
-
Sakai, Y., Sakurai, K.: Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, 1841, pp. 59-73. Springer, Heidelberg (2000)
-
Sakai, Y., Sakurai, K.: Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 59-73. Springer, Heidelberg (2000)
-
-
-
-
12
-
-
33645585449
-
ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive
-
Report 2003/054
-
Sakai, R., Kasahara, M.: ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive, Report 2003/054
-
-
-
Sakai, R.1
Kasahara, M.2
-
13
-
-
0343337504
-
Non-Malleable Cryptography. SIAM Journal on Computing, 2000
-
Dolev, D., Dwork, C., Naor, M.: Non-Malleable Cryptography. SIAM Journal on Computing, 2000. Early version in proceedings of STOC 1991 (2000)
-
(1991)
Early version in proceedings of STOC
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
|