-
1
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
Springer
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions CRYPTO 2005, Lecture notes in computer science vol. 3621 2005 Springer 205 222
-
(2005)
CRYPTO 2005, Lecture Notes in Computer Science
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
Springer
-
D. Boneh, and X. Boyen Efficient selective-ID secure identity based encryption without random oracles EUROCRYPT 2004, Lecture notes in computer science vol. 3027 2004 Springer 223 238
-
(2004)
EUROCRYPT 2004, Lecture Notes in Computer Science
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
3
-
-
35048901123
-
Public key encryption with keyword search
-
Springer
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano Public key encryption with keyword search EUROCRYPT 2004, Lecture notes in computer science vol. 2027 2005 Springer 506 522
-
(2005)
EUROCRYPT 2004, Lecture Notes in Computer Science
, vol.2027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
4
-
-
38049045519
-
Conjunctive subset and range queries on encrypted data
-
Springer
-
D. Boneh, and B. Waters Conjunctive subset and range queries on encrypted data TCC 2007, Lecture notes in computer science vol. 4392 2007 Springer 535 554
-
(2007)
TCC 2007, Lecture Notes in Computer Science
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
6
-
-
33746214783
-
Efficient conjunctive keyword search on encrypted data storage system
-
Springer
-
J.W. Byun, D.H. Lee, and J. Lim Efficient conjunctive keyword search on encrypted data storage system EUROPKI 2006, Lecture notes in computer science vol. 4043 2006 Springer 184 196
-
(2006)
EUROPKI 2006, Lecture Notes in Computer Science
, vol.4043
, pp. 184-196
-
-
Byun, J.W.1
Lee, D.H.2
Lim, J.3
-
7
-
-
33750696320
-
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
-
Springer
-
J.W. Byun, H.S. Rhee, H. Park, and D.H. Lee Off-line keyword guessing attacks on recent keyword search schemes over encrypted data SDM 2006, Lecture notes in computer science vol. 4165 2006 Springer 75 83
-
(2006)
SDM 2006, Lecture Notes in Computer Science
, vol.4165
, pp. 75-83
-
-
Byun, J.W.1
Rhee, H.S.2
Park, H.3
Lee, D.H.4
-
9
-
-
67049154037
-
Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data
-
J. Camenisch, M. Kohlweiss, A. Rial, and C. Sheedy Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data PKC, Lecture notes in computer science vol. 433 2009 196 214
-
(2009)
PKC, Lecture Notes in Computer Science
, vol.433
, pp. 196-214
-
-
Camenisch, J.1
Kohlweiss, M.2
Rial, A.3
Sheedy, C.4
-
10
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
ACM Press New York
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky Searchable symmetric encryption: improved definitions and efficient constructions ACM CCS, 2006 2007 ACM Press New York 79 88
-
(2007)
ACM CCS, 2006
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
14
-
-
54249087643
-
Efficient public key encryption with keyword search schemes from pairings
-
Springer
-
C. Gu, Y. Zhu, and Y. Zhang Efficient public key encryption with keyword search schemes from pairings INSCRYPT 2007, Lecture notes in computer science vol. 4990 2007 Springer 372 383
-
(2007)
INSCRYPT 2007, Lecture Notes in Computer Science
, vol.4990
, pp. 372-383
-
-
Gu, C.1
Zhu, Y.2
Zhang, Y.3
-
15
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extention to multi-user system PAIRING
-
Springer
-
Y.H. Hwang, and P.J. Lee Public key encryption with conjunctive keyword search and its extention to multi-user system PAIRING PAIRING 2007, Lecture notes in computer science vol. 4575 2007 Springer 2 22
-
(2007)
PAIRING 2007, Lecture Notes in Computer Science
, vol.4575
, pp. 2-22
-
-
Hwang, Y.H.1
Lee, P.J.2
-
16
-
-
1942420748
-
Oblivious keywords search
-
W. Ogata, and K. Kurosawa Oblivious keywords search Journal of Complexity 20 AprilJune 2004 356 371
-
(2004)
Journal of Complexity
, vol.20
, Issue.APRILJUNE
, pp. 356-371
-
-
Ogata, W.1
Kurosawa, K.2
-
19
-
-
64949106593
-
Secure searchable public key encryption scheme against keyword guessing attacks
-
H.S. Rhee, W. Susilo, and H.J. Kim Secure searchable public key encryption scheme against keyword guessing attacks IEICI Electronics Express 6 5 2009 237 243
-
(2009)
IEICI Electronics Express
, vol.6
, Issue.5
, pp. 237-243
-
-
Rhee, H.S.1
Susilo, W.2
Kim, H.J.3
-
20
-
-
77649179760
-
Trapdoor security in a searchable public-key encryption scheme with a designated tester
-
HS Rhee, JH Park, W Susulo, and DH Lee Trapdoor security in a searchable public-key encryption scheme with a designated tester Journal of Systems and Software 83 5 2010 763 771
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.5
, pp. 763-771
-
-
Rhee, H.S.1
Park, J.H.2
Susulo, W.3
Lee, D.H.4
-
22
-
-
78649330785
-
Revisit the concept of PEKS: Problems and a possible solution
-
Centre for telematics and information technology, University of Twente, Enschede. ISSN 1381-3625
-
Tang Q. Revisit the concept of PEKS: problems and a possible solution. Technical report TR-CTIT-08-54, Centre for telematics and information technology, University of Twente, Enschede. ISSN 1381-3625, 2008.
-
(2008)
Technical Report TR-CTIT-08-54
-
-
Tang, Q.1
-
23
-
-
58449092891
-
Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups
-
Springer
-
P. Wang, H. Wang, and J. Pieprzyk Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups CANS 2008, Lecture notes in computer science vol. 5339 2008 Springer 178 195
-
(2008)
CANS 2008, Lecture Notes in Computer Science
, vol.5339
, pp. 178-195
-
-
Wang, P.1
Wang, H.2
Pieprzyk, J.3
|