-
1
-
-
33745134401
-
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE and Extensions
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Abdalla, M., et al.: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE and Extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
-
2
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
-
Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: ACM CCCS, pp. 62-73 (1993)
-
(1993)
ACM CCCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneli, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneli, D.1
Franklin, M.2
-
4
-
-
35048901123
-
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persia.no, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, 3027, pp. 506-522. Springer, Heidelberg (2004)
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persia.no, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
-
-
-
5
-
-
35248835575
-
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
-
Eurocrypt 2001, Springer, Heidelberg
-
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Eurocrypt 2001. LNCS, vol. 2656, pp. 416-432. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
6
-
-
33745120364
-
-
Golle, P., Staddon, J., Waters, B.: Secure Conjunctive Search over Encrypted Data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, 3089, pp. 31-45. Springer, Heidelberg (2004)
-
Golle, P., Staddon, J., Waters, B.: Secure Conjunctive Search over Encrypted Data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31-45. Springer, Heidelberg (2004)
-
-
-
-
7
-
-
77952589508
-
Building an Encrypted and Searchable Audit Log
-
Waters, B., Balfanz, D., Durfee, G., Smetters, D.: Building an Encrypted and Searchable Audit Log. In: Network and Distributed System Security Symposium (NDSS 2004) (2004)
-
(2004)
Network and Distributed System Security Symposium (NDSS
-
-
Waters, B.1
Balfanz, D.2
Durfee, G.3
Smetters, D.4
|