-
1
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
3
-
-
35048841300
-
Efficient selective-ID identity based encryption without random oracles
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient selective-ID identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
4
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005) (Pubitemid 41313968)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
5
-
-
33745854208
-
Chosen-ciphertext security from identity-based encryption
-
Boneh, D., Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. SIAM Journal of Computing 36(5) (2007)
-
(2007)
SIAM Journal of Computing
, vol.36
, Issue.5
-
-
Boneh, D.1
Canetti, R.2
Halevi, S.3
Katz, J.4
-
6
-
-
35048901123
-
Public key encryption with keyword search
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
7
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM Journal of Computing 32(3) (2003);
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
0012970453
-
Preliminary version
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Preliminary version In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 213. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213
-
-
-
9
-
-
33646736337
-
Achieving efficient conjunctive keyword searches over encrypted data
-
Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. Springer, Heidelberg
-
Ballard, L., Kamara, S., Monrose, F.: Achieving efficient conjunctive keyword searches over encrypted data. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 414-426. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3783
, pp. 414-426
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
-
10
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (Without random oracles)
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Boyen, X., Waters, B.: Anonymous hierarchical identity-based encryption (without random oracles). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 290-307. Springer, Heidelberg (2006) (Pubitemid 44532122)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117 LNCS
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
11
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Boneh, D.,Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535-554. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
12
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
13
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
16
-
-
33746062799
-
Practical identity-based encryption without random oracles
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 445-464
-
-
Gentry, C.1
-
17
-
-
36549032633
-
Pairings for cryptographers
-
Report 2006/165
-
Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for cryptographers. Cryptology ePrint Archive, Report 2006/165 (2006), http://eprint.iacr.org/
-
(2006)
Cryptology ePrint Archive
-
-
Galbraith, S.D.1
Paterson, K.G.2
Smart, N.P.3
-
18
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Zheng, Y. (ed.) ASIACRYPT 2002. Springer, Heidelberg
-
Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
19
-
-
84947242701
-
Towards hierarchical identity-based encryption
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Horwitz, J., Lynn, B.: Towards hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, p. 466. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 466
-
-
Horwitz, J.1
Lynn, B.2
-
20
-
-
52149090559
-
Hidden-vector encryption with groups of prime order
-
Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. Springer, Heidelberg
-
Iovino, V., Persiano, G.: Hidden-vector encryption with groups of prime order. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 75-88. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5209
, pp. 75-88
-
-
Iovino, V.1
Persiano, G.2
-
21
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
Bosma, W. (ed.) ANTS 2000. Springer, Heidelberg
-
Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1838
-
-
Joux, A.1
-
22
-
-
34548774576
-
Multi-Dimensional Range Query over Encrypted Data
-
DOI 10.1109/SP.2007.29, 4223238, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
Shi, E., Bethencourt, J., Chan, H.T.-H., Song, D.X., Perrig, A.: Multi-dimensional range query over encrypted data. In: SP 2007: Proceedings of the 2007 IEEE Symposium on Security and Privacy (2007) (Pubitemid 47432540)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.-H.H.3
Song, D.4
Perrig, A.5
-
23
-
-
33646718113
-
Authenticated id-based key exchange and remote log-in with simple token and pin number
-
Scott, M.: Authenticated id-based key exchange and remote log-in with simple token and pin number. ePrint Report 2002/164 (2002)
-
(2002)
ePrint Report 2002/164
-
-
Scott, M.1
-
24
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
25
-
-
67049108616
-
Anonymous hierarchical identity-based encryption with constant size ciphertexts
-
Seo, J.H., Kobayashi, T., Ohkubo, M., Suzuki, K.: Anonymous hierarchical identity-based encryption with constant size ciphertexts. In: Irvine: Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography (2009)
-
Irvine: Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography (2009)
-
-
Seo, J.H.1
Kobayashi, T.2
Ohkubo, M.3
Suzuki, K.4
-
26
-
-
49049104392
-
Delegating capabilities in predicate encryption systems
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
-
Shi, E., Waters, B.: Delegating capabilities in predicate encryption systems. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 560-578. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 560-578
-
-
Shi, E.1
Waters, B.2
-
27
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|