메뉴 건너뛰기




Volumn 5888 LNCS, Issue , 2009, Pages 259-277

Private-key hidden vector encryption with key confidentiality

Author keywords

Key confidentiality; Private key predicate encryption

Indexed keywords

ATTRIBUTE VECTORS; CIPHERTEXTS; COMPLEXITY ASSUMPTIONS; CRYPTOGRAPHIC PRIMITIVES; ENCRYPTION SCHEMES; FINE-GRAINED CONTROL; HIDDEN VECTORS; PATTERN VECTORS; PRIVATE-KEY; RANDOM ORACLE; SECRET KEY; THE STANDARD MODEL;

EID: 71549159428     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10433-6_17     Document Type: Conference Paper
Times cited : (42)

References (11)
  • 1
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • BBG05, Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • [BBG05] Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 2
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • BDOP04, Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • [BDOP04] Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 3
    • 52149104493 scopus 로고    scopus 로고
    • [Boy08] Boyen, X.: The uber-assumption family - a unified complexity framework for bilinear groups. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, 5209, pp. 39-56. Springer, Heidelberg (2008)
    • [Boy08] Boyen, X.: The uber-assumption family - a unified complexity framework for bilinear groups. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 39-56. Springer, Heidelberg (2008)
  • 4
    • 33749573228 scopus 로고    scopus 로고
    • Anonymous hierarchical identity-based encryption (Without random oracles)
    • BW06, Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • [BW06] Boyen, X., Waters, B.: Anonymous hierarchical identity-based encryption (Without random oracles). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 290-307. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 290-307
    • Boyen, X.1    Waters, B.2
  • 5
    • 38049045519 scopus 로고    scopus 로고
    • [BW07] Boneh, D.,Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 535-554. Springer, Heidelberg (2007)
    • [BW07] Boneh, D.,Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535-554. Springer, Heidelberg (2007)
  • 6
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-Based Encryption for Fine-Grained Access Control for Encrypted Data
    • GPSW06, Alexandria, VA, USA, pp, ACM Press, New York
    • [GPSW06] Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-Based Encryption for Fine-Grained Access Control for Encrypted Data. In: ACM CCS 2006, Alexandria, VA, USA, pp. 89-98. ACM Press, New York (2006)
    • (2006) ACM CCS , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 7
    • 52149090559 scopus 로고    scopus 로고
    • [IP08] Iovino, V., Persiano, G.: Hidden-vector encryption with groups of prime order. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, 5209, pp. 75-88. Springer, Heidelberg (2008)
    • [IP08] Iovino, V., Persiano, G.: Hidden-vector encryption with groups of prime order. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 75-88. Springer, Heidelberg (2008)
  • 8
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • KSW08, Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
    • [KSW08] Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146-162. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 9
    • 35248818856 scopus 로고    scopus 로고
    • On cryptographic assumptions and challenges (invited talk)
    • Nao03, Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • [Nao03] Naor, M.: On cryptographic assumptions and challenges (invited talk). In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 96-109. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 96-109
    • Naor, M.1
  • 10
    • 34548774576 scopus 로고    scopus 로고
    • [SBC+07] Shi, E., Bethencourt, J., Chan, H., Song, D., Perrig, A.: Multi-Dimensional Range Query over Encrypted Data. In: 2007 IEEE Symposium on Security and Privacy, Oakland, CA. IEEE Computer Society Press, Oakland (2007)
    • [SBC+07] Shi, E., Bethencourt, J., Chan, H., Song, D., Perrig, A.: Multi-Dimensional Range Query over Encrypted Data. In: 2007 IEEE Symposium on Security and Privacy, Oakland, CA. IEEE Computer Society Press, Oakland (2007)
  • 11
    • 70350649061 scopus 로고    scopus 로고
    • [SSW09] Shen, E., Shi, E., Waters, B.: Predicate privacy in encryption systems. In: Reingold, O. (ed.) TCC 2009. LNCS, 5444, pp. 457-473. Springer, Heidelberg (2009)
    • [SSW09] Shen, E., Shi, E., Waters, B.: Predicate privacy in encryption systems. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 457-473. Springer, Heidelberg (2009)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.