메뉴 건너뛰기




Volumn 32, Issue 2, 2009, Pages 394-396

Constructing PEKS schemes secure against keyword guessing attacks is possible?

Author keywords

Consistency; Keyword guessing attack; Keyword search; Searchable encryption

Indexed keywords

ONLINE SEARCHING; POLYNOMIAL APPROXIMATION;

EID: 58249100325     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2008.11.018     Document Type: Article
Times cited : (120)

References (12)
  • 1
    • 33745134401 scopus 로고    scopus 로고
    • M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, H. Shi, Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions, in: CRYPTO 2005, LNCS 3621, 2005, pp. 205-222 (the full version appears in Journal of Cryptology (2007)).
    • M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, H. Shi, Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions, in: CRYPTO 2005, LNCS 3621, 2005, pp. 205-222 (the full version appears in Journal of Cryptology (2007)).
  • 2
    • 38149068986 scopus 로고    scopus 로고
    • M. Bellare, A. Boldyreva, A. O'Neill, Deterministic and efficiently searchable encryption, in: CRYPTO 2007, LNCS 4622, 2007, pp. 535-552.
    • M. Bellare, A. Boldyreva, A. O'Neill, Deterministic and efficiently searchable encryption, in: CRYPTO 2007, LNCS 4622, 2007, pp. 535-552.
  • 3
    • 58249120225 scopus 로고    scopus 로고
    • D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in: Eurocrypt 2004, LNCS 3089, 2004, pp. 31-45.
    • D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in: Eurocrypt 2004, LNCS 3089, 2004, pp. 31-45.
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • D. Boneh, M.K. Franklin, Identity-based encryption from the weil pairing, in: CRYPTO 2001, LNCS 2139, 2001, pp. 213-229 (the full version appears in SIAM Journal of Computing 32 (3) (2003) 586-615).
    • D. Boneh, M.K. Franklin, Identity-based encryption from the weil pairing, in: CRYPTO 2001, LNCS 2139, 2001, pp. 213-229 (the full version appears in SIAM Journal of Computing 32 (3) (2003) 586-615).
  • 5
    • 33750696320 scopus 로고    scopus 로고
    • J.W. Byun, H.S. Rhee, H. Park, D.H. Lee, Off-line keyword guessing attacks on recent keyword search schemes over encrypted data, in: SDM 2006, LNCS 4165, 2006, pp. 75-83.
    • J.W. Byun, H.S. Rhee, H. Park, D.H. Lee, Off-line keyword guessing attacks on recent keyword search schemes over encrypted data, in: SDM 2006, LNCS 4165, 2006, pp. 75-83.
  • 6
    • 58249111858 scopus 로고    scopus 로고
    • Y.C. Chang, M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, Cryptology ePrint Archive: Report 2004/051, 2004.
    • Y.C. Chang, M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, Cryptology ePrint Archive: Report 2004/051, 2004.
  • 7
    • 58249106478 scopus 로고    scopus 로고
    • E.J. Goh, Secure index, Cryptology ePrint Archive: Report 2003/216, 2003.
    • E.J. Goh, Secure index, Cryptology ePrint Archive: Report 2003/216, 2003.
  • 8
    • 33745120364 scopus 로고    scopus 로고
    • P. Golle, J. Staddon, B. Waters, Secure conjunctive keyword search over encrypted data, in: ACNS 2004, LNCS 3089, 2004, pp. 31-45.
    • P. Golle, J. Staddon, B. Waters, Secure conjunctive keyword search over encrypted data, in: ACNS 2004, LNCS 3089, 2004, pp. 31-45.
  • 9
    • 58249096783 scopus 로고    scopus 로고
    • F. Mish, Merriam-Webster's Collegiate Dictionary, 11th ed., Merriam-Webser Press, 2003. Refer to http://www.m-w.com/.
    • F. Mish, Merriam-Webster's Collegiate Dictionary, 11th ed., Merriam-Webser Press, 2003. Refer to http://www.m-w.com/.
  • 11
    • 23944469009 scopus 로고    scopus 로고
    • D.J. Park, K. Kim, P.J. Lee, Public key encryption with conjunctive field keyword search, in: WISA 2004, LNCS 3325, 2004, pp. 73-86.
    • D.J. Park, K. Kim, P.J. Lee, Public key encryption with conjunctive field keyword search, in: WISA 2004, LNCS 3325, 2004, pp. 73-86.
  • 12
    • 0033705124 scopus 로고    scopus 로고
    • D. Song, D. Wagner, A. Perrige, Practical techniques for searches on encrypted data, in: Proceedings of the IEEE Security and Privacy Symposium, 2000, pp. 44-55.
    • D. Song, D. Wagner, A. Perrige, Practical techniques for searches on encrypted data, in: Proceedings of the IEEE Security and Privacy Symposium, 2000, pp. 44-55.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.