-
1
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Lee, J.M., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Lee, J.M.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
Ning, P., De Capitani di Vimercati, S., Syverson, P. (eds.) ACM, ACM Press, New York
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Ning, P., De Capitani di Vimercati, S., Syverson, P. (eds.) ACM Conference on Computer and Communication Security (CCS 2007), ACM Press, New York (2007)
-
(2007)
Conference on Computer and Communication Security (CCS 2007)
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
3
-
-
72449185582
-
Proofs of Storage from Homomorphic Identification Protocols
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319-333. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
4
-
-
70249129465
-
Scalable and efficient provable data possession
-
ACM, New York
-
Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th international conference on Security and privacy in communication netowrks (SecureComm 2008), pp. 1-10. ACM, New York (2008)
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks (SecureComm 2008)
, pp. 1-10
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
5
-
-
33750246968
-
On the integration of public key data encryption and public key encryption with keyword search
-
Katsikas, S.K., Ĺopez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. Springer, Heidelberg
-
Baek, J., Safavi-Naini, R., Susilo,W.: On the integration of public key data encryption and public key encryption with keyword search. In: Katsikas, S.K., Ĺopez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 217-232. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4176
, pp. 217-232
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
6
-
-
54249101916
-
Public key encryption with keyword search revisited
-
Gervasi, O., Murgante, B., Lagaǹa, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. Springer, Heidelberg
-
Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Lagaǹa, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 1249-1259. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5072
, pp. 1249-1259
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
7
-
-
68649086619
-
Security guidance for critical areas of focus in cloud computing
-
April
-
Bardin, J., Callas, J., Chaput, S., Fusco, P., Gilbert, F., Hoff, C., Hurst, D., Kumaraswamy, S., Lynch, L., Matsumoto, S., O'Higgins, B., Pawluk, J., Reese, G., Reich, J., Ritter, J., Spivey, J., Viega, J.: Security guidance for critical areas of focus in cloud computing. Technical report, Cloud Security Alliance (April 2009)
-
(2009)
Technical Report, Cloud Security Alliance
-
-
Bardin, J.1
Callas, J.2
Chaput, S.3
Fusco, P.4
Gilbert, F.5
Hoff, C.6
Hurst, D.7
Kumaraswamy, S.8
Lynch, L.9
Matsumoto, S.10
O'Higgins, B.11
Pawluk, J.12
Reese, G.13
Reich, J.14
Ritter, J.15
Spivey, J.16
Viega, J.17
-
8
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
-
Bellare, M., Boldyreva, A., O'Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535-552. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
9
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronic medical records
-
ACM, New York
-
Benaloh, J., Chase, M., Horvitz, E., Lauter, K.: Patient controlled encryption: ensuring privacy of electronic medical records. In: ACM workshop on Cloud computing security (CCSW 2009), pp. 103-114. ACM, New York (2009)
-
(2009)
ACM Workshop on Cloud Computing Security (CCSW 2009)
, pp. 103-114
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
10
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
IEEE Computer Society, Los Alamitos
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321-334. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
11
-
-
35048901123
-
Public key encryption with keyword search
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
12
-
-
38049138213
-
Public-key encryption that allows PIR queries
-
Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
-
Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith, W.: Public-key encryption that allows PIR queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 50-67. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
Skeith, W.4
-
13
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535-554. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
14
-
-
57049120189
-
Proofs of retrievability: Theory and implementation
-
Bowers, K., Juels, A., Oprea, A.: Proofs of retrievability: Theory and implementation. Technical Report 2008/175, Cryptology ePrint Archive (2008)
-
(2008)
Technical Report 2008/175, Cryptology EPrint Archive
-
-
Bowers, K.1
Juels, A.2
Oprea, A.3
-
15
-
-
33750696320
-
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
-
Jonker, W., Petkovíc, M. (eds.) SDM 2006. Springer, Heidelberg
-
Byun, J.W., Rhee, H.S., Park, H.-A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker, W., Petkovíc, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75-83. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4165
, pp. 75-83
-
-
Byun, J.W.1
Rhee, H.S.2
Park, H.-A.3
Lee, D.H.4
-
16
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
-
Chang, Y., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3531
, pp. 442-455
-
-
Chang, Y.1
Mitzenmacher, M.2
-
17
-
-
38049078557
-
Multi-authority attribute based encryption
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515-534. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 515-534
-
-
Chase, M.1
-
19
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Juels, A., Wright, R., De Capitani di Vimercati, S. (eds.) ACM, New York
-
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. In: Juels, A., Wright, R., De Capitani di Vimercati, S. (eds.) ACM Conference on Computer and Communications Security (CCS 2006), pp. 79-88. ACM, New York (2006)
-
(2006)
ACM Conference on Computer and Communications Security (CCS 2006)
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
20
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109-127. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
21
-
-
74049121230
-
Dynamic provable data possession
-
ACM, New York
-
Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: ACM conference on Computer and communications security (CCS 2009), pp. 213-222. ACM, New York (2009)
-
(2009)
ACM Conference on Computer and Communications Security (CCS 2009)
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
22
-
-
38149055585
-
Decryptable searchable encryption
-
Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. Springer, Heidelberg
-
Fuhr, T., Paillier, P.: Decryptable searchable encryption. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 228-236. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4784
, pp. 228-236
-
-
Fuhr, T.1
Paillier, P.2
-
23
-
-
33244488406
-
Secure indexes
-
Goh, E.-J.: Secure indexes. Technical Report 2003/216, IACR ePrint Cryptography Archive (2003), http://eprint.iacr.org/2003/216
-
(2003)
Technical Report 2003/216
-
-
Goh, E.-J.1
-
24
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. Springer, Heidelberg
-
Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31-45. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3089
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
25
-
-
34547273527
-
Attribute-based encryption for finegrained access control of encrypted data
-
ACM, New York
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: ACM conference on Computer and communications security (CCS 2006), pp. 89-98. ACM, New York (2006)
-
(2006)
ACM Conference on Computer and Communications Security (CCS 2006)
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
26
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
Ning, P., De Capitani di Vimercati, S., Syverson, P. (eds.) ACM, New York
-
Juels, A., Kaliski, B.: PORs: Proofs of retrievability for large files. In: Ning, P., De Capitani di Vimercati, S., Syverson, P. (eds.) ACM Conference on Computer and Communication Security (CCS 2007). ACM, New York (2007)
-
(2007)
ACM Conference on Computer and Communication Security (CCS 2007)
-
-
Juels, A.1
Kaliski, B.2
-
27
-
-
74049120601
-
Attribute-based encryption with nonmonotonic access structures
-
ACM, New York
-
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with nonmonotonic access structures. In: ACM conference on Computer and communications security (CCS 2007), pp. 195-203. ACM, New York (2007)
-
(2007)
ACM Conference on Computer and Communications Security (CCS 2007)
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
28
-
-
23944469009
-
Public key encryption with conjunctive field keyword search
-
Lim, C.H., Yung, M. (eds.) WISA 2004. Springer, Heidelberg
-
Park, D., Kim, K., Lee, P.: Public key encryption with conjunctive field keyword search. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 73-86. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3325
, pp. 73-86
-
-
Park, D.1
Kim, K.2
Lee, P.3
-
29
-
-
24944554962
-
Fuzzy identity-based encryption
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
30
-
-
58349118819
-
Compact proofs of retrievability
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
31
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
Washington, DC, USA, IEEE Computer Society, Los Alamitos
-
Shi, E., Bethencourt, J., Chan, T., Song, D., Perrig, A.: Multi-dimensional range query over encrypted data. In: IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 350-364. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.3
Song, D.4
Perrig, A.5
-
32
-
-
0033705124
-
Practical techniques for searching on encrypted data
-
IEEE Computer Society, Los Alamitos
-
Song, D., Wagner, D., Perrig, A.: Practical techniques for searching on encrypted data. In: IEEE Symposium on Research in Security and Privacy, pp. 44-55. IEEE Computer Society, Los Alamitos (2000)
-
(2000)
IEEE Symposium on Research in Security and Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
33
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355-370. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
34
-
-
77956146231
-
Compay caught in texas data center raid loses suit against FBI
-
April
-
Zetter, K.: Compay caught in texas data center raid loses suit against FBI. Wired Magazine (April 2009)
-
(2009)
Wired Magazine
-
-
Zetter, K.1
|