메뉴 건너뛰기




Volumn 34, Issue 1, 2011, Pages 262-267

An efficient public key encryption with conjunctive-subset keywords search

Author keywords

Conjunctive; Public key model; Subset keywords search

Indexed keywords

CIPHERTEXTS; CONJUNCTIVE; EFFICIENT CONSTRUCTION; KEYWORD SEARCH; PUBLIC-KEY ENCRYPTION; PUBLIC-KEY MODEL; SECURITY ANALYSIS; SECURITY REQUIREMENTS; SUBSET KEYWORDS SEARCH;

EID: 78649325305     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2010.07.007     Document Type: Article
Times cited : (200)

References (23)
  • 2
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity based encryption without random oracles
    • Springer
    • D. Boneh, and X. Boyen Efficient selective-ID secure identity based encryption without random oracles EUROCRYPT 2004, Lecture notes in computer science vol. 3027 2004 Springer 223 238
    • (2004) EUROCRYPT 2004, Lecture Notes in Computer Science , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 4
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive subset and range queries on encrypted data
    • Springer
    • D. Boneh, and B. Waters Conjunctive subset and range queries on encrypted data TCC 2007, Lecture notes in computer science vol. 4392 2007 Springer 535 554
    • (2007) TCC 2007, Lecture Notes in Computer Science , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 5
  • 6
    • 33746214783 scopus 로고    scopus 로고
    • Efficient conjunctive keyword search on encrypted data storage system
    • Springer
    • J.W. Byun, D.H. Lee, and J. Lim Efficient conjunctive keyword search on encrypted data storage system EUROPKI 2006, Lecture notes in computer science vol. 4043 2006 Springer 184 196
    • (2006) EUROPKI 2006, Lecture Notes in Computer Science , vol.4043 , pp. 184-196
    • Byun, J.W.1    Lee, D.H.2    Lim, J.3
  • 7
    • 33750696320 scopus 로고    scopus 로고
    • Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
    • Springer
    • J.W. Byun, H.S. Rhee, H. Park, and D.H. Lee Off-line keyword guessing attacks on recent keyword search schemes over encrypted data SDM 2006, Lecture notes in computer science vol. 4165 2006 Springer 75 83
    • (2006) SDM 2006, Lecture Notes in Computer Science , vol.4165 , pp. 75-83
    • Byun, J.W.1    Rhee, H.S.2    Park, H.3    Lee, D.H.4
  • 9
    • 67049154037 scopus 로고    scopus 로고
    • Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data
    • J. Camenisch, M. Kohlweiss, A. Rial, and C. Sheedy Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data PKC, Lecture notes in computer science vol. 433 2009 196 214
    • (2009) PKC, Lecture Notes in Computer Science , vol.433 , pp. 196-214
    • Camenisch, J.1    Kohlweiss, M.2    Rial, A.3    Sheedy, C.4
  • 10
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • ACM Press New York
    • R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky Searchable symmetric encryption: improved definitions and efficient constructions ACM CCS, 2006 2007 ACM Press New York 79 88
    • (2007) ACM CCS, 2006 , pp. 79-88
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 11
  • 12
    • 38349025630 scopus 로고    scopus 로고
    • Public key encryption with searchable keywords based on Jacobi symbols
    • Springer
    • G.D. Crescenzo, and V. Saraswat Public key encryption with searchable keywords based on Jacobi symbols INDOCRYPT 2007, Lecture notes in computer science vol. 4859 2007 Springer 282 296
    • (2007) INDOCRYPT 2007, Lecture Notes in Computer Science , vol.4859 , pp. 282-296
    • Crescenzo, G.D.1    Saraswat, V.2
  • 14
    • 54249087643 scopus 로고    scopus 로고
    • Efficient public key encryption with keyword search schemes from pairings
    • Springer
    • C. Gu, Y. Zhu, and Y. Zhang Efficient public key encryption with keyword search schemes from pairings INSCRYPT 2007, Lecture notes in computer science vol. 4990 2007 Springer 372 383
    • (2007) INSCRYPT 2007, Lecture Notes in Computer Science , vol.4990 , pp. 372-383
    • Gu, C.1    Zhu, Y.2    Zhang, Y.3
  • 15
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extention to multi-user system PAIRING
    • Springer
    • Y.H. Hwang, and P.J. Lee Public key encryption with conjunctive keyword search and its extention to multi-user system PAIRING PAIRING 2007, Lecture notes in computer science vol. 4575 2007 Springer 2 22
    • (2007) PAIRING 2007, Lecture Notes in Computer Science , vol.4575 , pp. 2-22
    • Hwang, Y.H.1    Lee, P.J.2
  • 16
    • 1942420748 scopus 로고    scopus 로고
    • Oblivious keywords search
    • W. Ogata, and K. Kurosawa Oblivious keywords search Journal of Complexity 20 AprilJune 2004 356 371
    • (2004) Journal of Complexity , vol.20 , Issue.APRILJUNE , pp. 356-371
    • Ogata, W.1    Kurosawa, K.2
  • 17
  • 19
    • 64949106593 scopus 로고    scopus 로고
    • Secure searchable public key encryption scheme against keyword guessing attacks
    • H.S. Rhee, W. Susilo, and H.J. Kim Secure searchable public key encryption scheme against keyword guessing attacks IEICI Electronics Express 6 5 2009 237 243
    • (2009) IEICI Electronics Express , vol.6 , Issue.5 , pp. 237-243
    • Rhee, H.S.1    Susilo, W.2    Kim, H.J.3
  • 20
    • 77649179760 scopus 로고    scopus 로고
    • Trapdoor security in a searchable public-key encryption scheme with a designated tester
    • HS Rhee, JH Park, W Susulo, and DH Lee Trapdoor security in a searchable public-key encryption scheme with a designated tester Journal of Systems and Software 83 5 2010 763 771
    • (2010) Journal of Systems and Software , vol.83 , Issue.5 , pp. 763-771
    • Rhee, H.S.1    Park, J.H.2    Susulo, W.3    Lee, D.H.4
  • 22
    • 78649330785 scopus 로고    scopus 로고
    • Revisit the concept of PEKS: Problems and a possible solution
    • Centre for telematics and information technology, University of Twente, Enschede. ISSN 1381-3625
    • Tang Q. Revisit the concept of PEKS: problems and a possible solution. Technical report TR-CTIT-08-54, Centre for telematics and information technology, University of Twente, Enschede. ISSN 1381-3625, 2008.
    • (2008) Technical Report TR-CTIT-08-54
    • Tang, Q.1
  • 23
    • 58449092891 scopus 로고    scopus 로고
    • Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups
    • Springer
    • P. Wang, H. Wang, and J. Pieprzyk Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups CANS 2008, Lecture notes in computer science vol. 5339 2008 Springer 178 195
    • (2008) CANS 2008, Lecture Notes in Computer Science , vol.5339 , pp. 178-195
    • Wang, P.1    Wang, H.2    Pieprzyk, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.