-
1
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1-30 (2006)
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
3
-
-
33750246968
-
On the integration of public key data encryption and public key encryption with keyword search
-
Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. Springer, Heidelberg
-
Baek, J., Safavi-Naini, R., Susilo,W.: On the integration of public key data encryption and public key encryption with keyword search. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 217-232. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4176
, pp. 217-232
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
4
-
-
54249101916
-
Public key encryption with keyword search revisited
-
Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. Springer, Heidelberg
-
Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 1249-1259. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5072
, pp. 1249-1259
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
5
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
6
-
-
35048901123
-
Public key encryption with keyword search
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
7
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
8
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption
-
Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM, New York
-
Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 185-194. ACM, New York (2007)
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
9
-
-
38349025630
-
Public key encryption with searchable keywords based on jacobi symbols
-
Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. Springer, Heidelberg
-
Crescenzo, G.D., Saraswat, V.: Public key encryption with searchable keywords based on jacobi symbols. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 282-296. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4859
, pp. 282-296
-
-
Crescenzo, G.D.1
Saraswat, V.2
-
10
-
-
54249087643
-
Efficient public key encryption with keyword search schemes from pairings
-
Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007. Springer, Heidelberg
-
Gu, C., Zhu, Y., Pan, H.: Efficient public key encryption with keyword search schemes from pairings. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007. LNCS, vol. 4990, pp. 372-383. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4990
, pp. 372-383
-
-
Gu, C.1
Zhu, Y.2
Pan, H.3
-
11
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. Springer, Heidelberg
-
Hwang, Y.H., Lee, P.J.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 2-22. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4575
, pp. 2-22
-
-
Hwang, Y.H.1
Lee, P.J.2
-
12
-
-
23944469009
-
Public key encryption with conjunctive field keyword search
-
Lim, C.H., Yung, M. (eds.) WISA 2004. Springer, Heidelberg
-
Park, D.J., Kim, K., Lee, P.J.: Public key encryption with conjunctive field keyword search. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 73-86. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3325
, pp. 73-86
-
-
Park, D.J.1
Kim, K.2
Lee, P.J.3
-
13
-
-
71549160150
-
Improved searchable public key encryption with designated tester
-
Li, W., Susilo, W., Tupakula, U.K., Safavi-Naini, R., Varadharajan, V. (eds.) ACM, New York
-
Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Improved searchable public key encryption with designated tester. In: Li, W., Susilo, W., Tupakula, U.K., Safavi-Naini, R., Varadharajan, V. (eds.) ASIACCS, pp. 376-379. ACM, New York (2009)
-
(2009)
ASIACCS
, pp. 376-379
-
-
Rhee, H.S.1
Park, J.H.2
Susilo, W.3
Lee, D.H.4
-
14
-
-
77649179760
-
Trapdoor security in a searchable public-key encryption scheme with a designated tester
-
Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software 83(5), 763-771 (2010)
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.5
, pp. 763-771
-
-
Rhee, H.S.1
Park, J.H.2
Susilo, W.3
Lee, D.H.4
-
15
-
-
64949106593
-
Secure searchable public key encryption scheme against keyword guessing attacks
-
Rhee, H.S., Susilo, W., Kim, H.J.: Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electronics Express 6(5), 237-243 (2009)
-
(2009)
IEICE Electronics Express
, vol.6
, Issue.5
, pp. 237-243
-
-
Rhee, H.S.1
Susilo, W.2
Kim, H.J.3
-
16
-
-
24944554962
-
Fuzzy identity-based encryption
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
17
-
-
77950864045
-
Proxy re-encryption with keyword search
-
Shao, J., Cao, Z., Liang, X., Lin, H.: Proxy re-encryption with keyword search. Inf. Sci. 180(13), 2576-2587 (2010)
-
(2010)
Inf. Sci.
, vol.180
, Issue.13
, pp. 2576-2587
-
-
Shao, J.1
Cao, Z.2
Liang, X.3
Lin, H.4
-
18
-
-
38349070353
-
Generic combination of public key encryption with keyword search and public key encryption
-
Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. Springer, Heidelberg
-
Zhang, R., Imai, H.: Generic combination of public key encryption with keyword search and public key encryption. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 159-174. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4856
, pp. 159-174
-
-
Zhang, R.1
Imai, H.2
|