메뉴 건너뛰기




Volumn 6391 LNCS, Issue , 2010, Pages 163-178

Public-key encryption with registered keyword search

Author keywords

[No Author keywords available]

Indexed keywords

BATCH MODES; KEYWORD SEARCH; OFF-LINE KEYWORD GUESSING ATTACK; PUBLIC-KEY ENCRYPTION; SEMANTIC SECURITY; PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH (PEKS);

EID: 78449236216     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-16441-5_11     Document Type: Conference Paper
Times cited : (98)

References (24)
  • 1
    • 33745134401 scopus 로고    scopus 로고
    • Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone- Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 205-222
    • Abdalla, M.1    Bellare, M.2    Catalano, D.3    Kiltz, E.4    Kohno, T.5    Lange, T.6    Malone-Lee, J.7    Neven, G.8    Paillier, P.9    Shi, H.10
  • 2
    • 33750246968 scopus 로고    scopus 로고
    • On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search
    • Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. Springer, Heidelberg
    • Baek, J., Safavi-Naini, R., Susilo, W.: On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 217-232. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4176 , pp. 217-232
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 3
    • 54249101916 scopus 로고    scopus 로고
    • Public Key Encryption with Keyword Search Revisited
    • Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. Springer, Heidelberg
    • Baek, J., Safavi-Naini, R., Susilo, W.: Public Key Encryption with Keyword Search Revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 1249-1259. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5072 , pp. 1249-1259
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 4
    • 41549164259 scopus 로고    scopus 로고
    • Private Query on Encrypted Data in Multi-user Settings
    • Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. Springer, Heidelberg
    • Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private Query on Encrypted Data in Multi-user Settings. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 71-85. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4991 , pp. 71-85
    • Bao, F.1    Deng, R.H.2    Ding, X.3    Yang, Y.4
  • 5
    • 35048901123 scopus 로고    scopus 로고
    • Public Key Encryption with Keyword Search
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Boneh, D., Franklin, M.K.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 7
    • 38049138213 scopus 로고    scopus 로고
    • Public Key Encryption That Allows PIR Queries
    • Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
    • Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith III., W.E.: Public Key Encryption That Allows PIR Queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 50-67. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 50-67
    • Boneh, D.1    Kushilevitz, E.2    Ostrovsky, R.3    Skeith III, W.E.4
  • 8
    • 33750696320 scopus 로고    scopus 로고
    • Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data
    • Jonker, W., Petković, M. (eds.) SDM 2006. Springer, Heidelberg
    • Byun, J.W., Rhee, H.S., Park, H., Lee, D.H.: Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75-83. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4165 , pp. 75-83
    • Byun, J.W.1    Rhee, H.S.2    Park, H.3    Lee, D.H.4
  • 9
    • 26444507272 scopus 로고    scopus 로고
    • Privacy Preserving Keyword Searches on Remote Encrypted Data
    • Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
    • Chang, Y., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3531 , pp. 442-455
    • Chang, Y.1    Mitzenmacher, M.2
  • 11
    • 38349025630 scopus 로고    scopus 로고
    • Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
    • Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. Springer, Heidelberg
    • Di Crescenzo, G., Saraswat, V.: Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 282-296. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4859 , pp. 282-296
    • Di Crescenzo, G.1    Saraswat, V.2
  • 12
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • Juels, A., Wright, R.N., De Capitani di Vimercati, S. (eds.) ACM, New York
    • Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Juels, A., Wright, R.N., De Capitani di Vimercati, S. (eds.) ACM Conference on Computer and Communications Security, pp. 79-88. ACM, New York (2006)
    • (2006) ACM Conference on Computer and Communications Security , pp. 79-88
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 14
    • 33244488406 scopus 로고    scopus 로고
    • Secure Indexes
    • Report 2003/216
    • Goh, E.: Secure Indexes. Cryptology ePrint Archive, Report 2003/216 (2003), http://eprint.iacr.org/2003/216/
    • (2003) Cryptology ePrint Archive
    • Goh, E.1
  • 15
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM 43(3), 431-473 (1996) (Pubitemid 126607640)
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 16
    • 50049095455 scopus 로고    scopus 로고
    • Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System
    • Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. Springer, Heidelberg
    • Hwang, Y.H., Lee, P.J.: Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 2-22. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4575 , pp. 2-22
    • Hwang, Y.H.1    Lee, P.J.2
  • 17
    • 38149064448 scopus 로고    scopus 로고
    • Public Key Encryption with Keyword Search Based on K-Resilient IBE
    • Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. Springer, Heidelberg
    • Khader, D.: Public Key Encryption with Keyword Search Based on K-Resilient IBE. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. LNCS, vol. 4707, pp. 1086-1095. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4707 , pp. 1086-1095
    • Khader, D.1
  • 18
    • 0003657590 scopus 로고    scopus 로고
    • 3rd edn. Sorting and Searching. Addison-Wesley, Reading
    • Knuth, D.E.: The Art of Computer Programming, 3rd edn. Sorting and Searching. Addison-Wesley, Reading (1997)
    • (1997) The Art of Computer Programming
    • Knuth, D.E.1
  • 19
    • 38149013554 scopus 로고    scopus 로고
    • A Survey of Single Database PIR: Techniques and Applications
    • Report 2007/059
    • Ostrovsky, R., Skeith III, W.E.: A Survey of Single Database PIR: Techniques and Applications. Cryptology ePrint Archive: Report 2007/059 (2007)
    • (2007) Cryptology ePrint Archive
    • Ostrovsky, R.1    Skeith III, W.E.2
  • 21
    • 78449242230 scopus 로고    scopus 로고
    • Technical report, Centre for Telematics and Information Technology
    • Tang, Q., Chen, L.: Public-key encryption with registered keyword search. Technical report, Centre for Telematics and Information Technology, University of Twente (2009), http://eprints.eemcs.utwente.nl/15836/
    • (2009) Public-key Encryption with Registered Keyword Search
    • Tang, Q.1    Chen, L.2
  • 23
    • 48249091242 scopus 로고    scopus 로고
    • Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes
    • Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds.) ATC 2008. Springer, Heidelberg
    • Yau, W.-C., Heng, S.-H., Goi, B.-M.: Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds.) ATC 2008. LNCS, vol. 5060, pp. 100-105. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5060 , pp. 100-105
    • Yau, W.-C.1    Heng, S.-H.2    Goi, B.-M.3
  • 24
    • 38349070353 scopus 로고    scopus 로고
    • Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
    • Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. Springer, Heidelberg
    • Zhang, R., Imai, H.: Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 159-174. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4856 , pp. 159-174
    • Zhang, R.1    Imai, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.