-
1
-
-
33745134401
-
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone- Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
33750246968
-
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search
-
Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. Springer, Heidelberg
-
Baek, J., Safavi-Naini, R., Susilo, W.: On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 217-232. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4176
, pp. 217-232
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
3
-
-
54249101916
-
Public Key Encryption with Keyword Search Revisited
-
Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. Springer, Heidelberg
-
Baek, J., Safavi-Naini, R., Susilo, W.: Public Key Encryption with Keyword Search Revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 1249-1259. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5072
, pp. 1249-1259
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
4
-
-
41549164259
-
Private Query on Encrypted Data in Multi-user Settings
-
Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. Springer, Heidelberg
-
Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private Query on Encrypted Data in Multi-user Settings. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 71-85. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4991
, pp. 71-85
-
-
Bao, F.1
Deng, R.H.2
Ding, X.3
Yang, Y.4
-
5
-
-
35048901123
-
Public Key Encryption with Keyword Search
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin, M.K.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
7
-
-
38049138213
-
Public Key Encryption That Allows PIR Queries
-
Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
-
Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith III., W.E.: Public Key Encryption That Allows PIR Queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 50-67. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
Skeith III, W.E.4
-
8
-
-
33750696320
-
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data
-
Jonker, W., Petković, M. (eds.) SDM 2006. Springer, Heidelberg
-
Byun, J.W., Rhee, H.S., Park, H., Lee, D.H.: Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75-83. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4165
, pp. 75-83
-
-
Byun, J.W.1
Rhee, H.S.2
Park, H.3
Lee, D.H.4
-
9
-
-
26444507272
-
Privacy Preserving Keyword Searches on Remote Encrypted Data
-
Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
-
Chang, Y., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3531
, pp. 442-455
-
-
Chang, Y.1
Mitzenmacher, M.2
-
10
-
-
0032201622
-
Private information retrieval
-
Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965-981 (1998)
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
11
-
-
38349025630
-
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
-
Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. Springer, Heidelberg
-
Di Crescenzo, G., Saraswat, V.: Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 282-296. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4859
, pp. 282-296
-
-
Di Crescenzo, G.1
Saraswat, V.2
-
12
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Juels, A., Wright, R.N., De Capitani di Vimercati, S. (eds.) ACM, New York
-
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Juels, A., Wright, R.N., De Capitani di Vimercati, S. (eds.) ACM Conference on Computer and Communications Security, pp. 79-88. ACM, New York (2006)
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
14
-
-
33244488406
-
Secure Indexes
-
Report 2003/216
-
Goh, E.: Secure Indexes. Cryptology ePrint Archive, Report 2003/216 (2003), http://eprint.iacr.org/2003/216/
-
(2003)
Cryptology ePrint Archive
-
-
Goh, E.1
-
15
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM 43(3), 431-473 (1996) (Pubitemid 126607640)
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
16
-
-
50049095455
-
Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System
-
Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. Springer, Heidelberg
-
Hwang, Y.H., Lee, P.J.: Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 2-22. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4575
, pp. 2-22
-
-
Hwang, Y.H.1
Lee, P.J.2
-
17
-
-
38149064448
-
Public Key Encryption with Keyword Search Based on K-Resilient IBE
-
Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. Springer, Heidelberg
-
Khader, D.: Public Key Encryption with Keyword Search Based on K-Resilient IBE. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. LNCS, vol. 4707, pp. 1086-1095. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4707
, pp. 1086-1095
-
-
Khader, D.1
-
18
-
-
0003657590
-
-
3rd edn. Sorting and Searching. Addison-Wesley, Reading
-
Knuth, D.E.: The Art of Computer Programming, 3rd edn. Sorting and Searching. Addison-Wesley, Reading (1997)
-
(1997)
The Art of Computer Programming
-
-
Knuth, D.E.1
-
19
-
-
38149013554
-
A Survey of Single Database PIR: Techniques and Applications
-
Report 2007/059
-
Ostrovsky, R., Skeith III, W.E.: A Survey of Single Database PIR: Techniques and Applications. Cryptology ePrint Archive: Report 2007/059 (2007)
-
(2007)
Cryptology ePrint Archive
-
-
Ostrovsky, R.1
Skeith III, W.E.2
-
20
-
-
0033705124
-
Practical Techniques for Searches on Encrypted Data
-
Song, D.X., Wagner, D., Perrig, A.: Practical Techniques for Searches on Encrypted Data. In: IEEE Symposium on Security and Privacy, pp. 44-55 (2000)
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
21
-
-
78449242230
-
-
Technical report, Centre for Telematics and Information Technology
-
Tang, Q., Chen, L.: Public-key encryption with registered keyword search. Technical report, Centre for Telematics and Information Technology, University of Twente (2009), http://eprints.eemcs.utwente.nl/15836/
-
(2009)
Public-key Encryption with Registered Keyword Search
-
-
Tang, Q.1
Chen, L.2
-
22
-
-
77952589508
-
Building an Encrypted and Searchable Audit Log
-
The Internet Society
-
Waters, B.R., Balfanz, D., Durfee, G., Smetters, D.K.: Building an Encrypted and Searchable Audit Log. In: Proceedings of the Network and Distributed System Security Symposium (NDSS 2004). The Internet Society (2004)
-
(2004)
Proceedings of the Network and Distributed System Security Symposium (NDSS 2004)
-
-
Waters, B.R.1
Balfanz, D.2
Durfee, G.3
Smetters, D.K.4
-
23
-
-
48249091242
-
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes
-
Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds.) ATC 2008. Springer, Heidelberg
-
Yau, W.-C., Heng, S.-H., Goi, B.-M.: Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds.) ATC 2008. LNCS, vol. 5060, pp. 100-105. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5060
, pp. 100-105
-
-
Yau, W.-C.1
Heng, S.-H.2
Goi, B.-M.3
-
24
-
-
38349070353
-
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
-
Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. Springer, Heidelberg
-
Zhang, R., Imai, H.: Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 159-174. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4856
, pp. 159-174
-
-
Zhang, R.1
Imai, H.2
|