-
1
-
-
33745134401
-
-
In Proc. CRYPTO 2005, LNCS, Springer, Heidelberg
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE and Extensions. In Proc. CRYPTO 2005, LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg(2005)
-
(2005)
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE and Extensions
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
54249101916
-
-
In Proc. of Applied Cryptography and Information Security 06 (ACIS 2006), LNCS, Springer, Heidelberg
-
J. Baek, R. Safavi-Naini and W. Susilo. Public Key Encryption with Keyword Search Revisited. In Proc. of Applied Cryptography and Information Security 06 (ACIS 2006), LNCS, vol. 5072, pp. 1249 -1259. Springer, Heidelberg(2008)
-
(2008)
Public Key Encryption With Keyword Search Revisited
, vol.5072
, pp. 1249-1259
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
3
-
-
33750246968
-
-
In Proc. of ISC 2006, LNCS, Springer, Heidelberg
-
J. Baek, R. Safavi-Naini and W. Susilo. On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. In Proc. of ISC 2006, LNCS, vol. 4176, pp. 217 - 232. Springer, Heidelberg(2006)
-
(2006)
On the Integration of Public Key Data Encryption and Public Key Encryption With Keyword Search
, vol.4176
, pp. 217-232
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
4
-
-
35048901123
-
-
In Proc. of EUROCRYPT 2004. LNCS, Springer, Heidelberg
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, G Persiano. Public Key Encryption with Keyword Search. In Proc. of EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg(2004)
-
(2004)
Public Key Encryption With Keyword Search
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
5
-
-
38049045519
-
-
In Proc. of TCC 2007. LNCS, Springer, Heidelberg
-
D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In Proc. of TCC 2007. LNCS, vol. 4392, pp. 535-554. Springer, Heidelberg(2007)
-
(2007)
Conjunctive, Subset, and Range Queries On Encrypted Data
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
6
-
-
33750696320
-
-
In Proc. of SDM 2006. LNCS, Springer, Heidelberg
-
J.W. Byun, H.S. Rhee, H. A. Park, D.H. Lee. Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. In Proc. of SDM 2006. LNCS, vol. 4165, pp. 75-83. Springer, Heidelberg(2006)
-
(2006)
Off-Line Keyword Guessing Attacks On Recent Keyword Search Schemes Over Encrypted Data
, vol.4165
, pp. 75-83
-
-
Byun, J.W.1
Rhee, H.S.2
Park, H.A.3
Lee, D.H.4
-
7
-
-
0031619016
-
-
In Proc. of 30th ACM STOC}, ACM Press
-
R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. In Proc. of 30th ACM STOC}, ACM Press, pp. 209-218, 1998.
-
(1998)
The Random Oracle Methodology, Revisited
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
8
-
-
71549153479
-
-
In Proc. of Cryptology and Network Security, 8th International Conference, CANS 2009, LNCS 5888, Springer, Heidelberg
-
L. Fang, W. Susilo, C. Ge and J. Wang. A Secure Channel Free Public Key Encryption With Keyword Search Scheme Without Random Oracle. In Proc. of Cryptology and Network Security, 8th International Conference, CANS 2009, LNCS 5888, Springer, Heidelberg, 2009, pp. 248-258.
-
(2009)
A Secure Channel Free Public Key Encryption With Keyword Search Scheme Without Random Oracle
, pp. 248-258
-
-
Fang, L.1
Susilo, W.2
Ge, C.3
Wang, J.4
-
9
-
-
38149055585
-
-
In ProvSec 2007, LNCS, Springer, Heidelberg
-
T. Fuhr and P. Paillier. Decryptable searchable encryption. In ProvSec 2007, LNCS, vol. 4784, pp. 228-236. Springer, Heidelberg(2007)
-
(2007)
Decryptable Searchable Encryption
, vol.4784
, pp. 228-236
-
-
Fuhr, T.1
Paillier, P.2
-
10
-
-
33746062799
-
-
In Proc. EUROCRYPT 2006, LNCS, Springer, Heidelberg
-
C. Gentry. Practical identity-based encryption without random oracles. In Proc. EUROCRYPT 2006, LNCS, vol. 4004, pp. 457-464. Springer, Heidelberg(2006)
-
(2006)
Practical Identity-based Encryption Without Random Oracles
, vol.4004
, pp. 457-464
-
-
Gentry, C.1
-
11
-
-
54249087643
-
-
Springer, Heidelberg
-
C. Gu,Y Zhu, and H. Pan. Efficient Public Key Encryption with Keyword Search Schemes from Pairings. In Proc. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, LNCS, vol. 4990, pp. 372-383. Springer, Heidelberg(2007)
-
(2007)
Efficient Public Key Encryption With Keyword Search Schemes From Pairings. In Proc. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, LNCS
, vol.4990
, pp. 372-383
-
-
Gu, C.1
Zhu, Y.2
Pan, H.3
-
13
-
-
33745120364
-
Secure Conjunctive Search over Encrypted Data
-
In: Jakobsson, M., Yung, M., Zhou, J. (eds.), Springer, Heidelberg
-
P. Golle, J. Staddon, B. Waters. Secure Conjunctive Search over Encrypted Data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) Proc. ACNS 2004. LNCS, vol. 3089, pp. 31-45. Springer, Heidelberg (2004)
-
(2004)
Proc. ACNS 2004. LNCS
, vol.3089
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
14
-
-
58249100325
-
Constructing PEKS schemes secure against keyword guessing attacks is possible?
-
I. R. Jeong, J. O. Kwon, D. Hong, and D. H. Lee. Constructing PEKS schemes secure against keyword guessing attacks is possible? Computer Communications. Express, Vol. 32, No. 2, p.394-396, (2009).
-
(2009)
Computer Communications. Express
, vol.32
, Issue.2
, pp. 394-396
-
-
Jeong, I.R.1
Kwon, J.O.2
Hong, D.3
Lee, D.H.4
-
15
-
-
64949106593
-
Secure searchable public key encryption scheme against keyword guessing attacks
-
Express
-
H. S. Rhee, W. Susilo and H-J. Kim. Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron. Express, Vol. 6, No. 5, pp.237-243, (2009).
-
(2009)
IEICE Electron
, vol.6
, Issue.5
, pp. 237-243
-
-
Rhee, H.S.1
Susilo, W.2
Kim, H.-J.3
-
16
-
-
77958060874
-
Searching Keywords with Wildcards on Encrypted Data
-
Springer, Heidelberg
-
S. Sedghi, P. Liesdonk, S. Nikova, P. Hartel and W. Jonker. Searching Keywords with Wildcards on Encrypted Data. Proc. of SCN 2010, LNCS, vol. 6280, pp. 138-153. Springer, Heidelberg
-
Proc. of SCN 2010, LNCS
, vol.6280
, pp. 138-153
-
-
Sedghi, S.1
Liesdonk, P.2
Nikova, S.3
Hartel, P.4
Jonker, W.5
-
17
-
-
78751499567
-
-
Proc. of Network and Distributed System Security Symposium, NDSS
-
B. Waters, D. Balfanz, G. Durfee, D. Smetters. Building an Encrypted and Searchable Audit Log. Proc. of Network and Distributed System Security Symposium (NDSS 2004), (2004)
-
(2004)
Building An Encrypted and Searchable Audit Log
, pp. 2004
-
-
Waters, B.1
Balfanz, D.2
Durfee, G.3
Smetters, D.4
-
18
-
-
48249091242
-
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes
-
Springer, Heidelberg
-
W. C. Yau, S. H. Heng and B. Goi. Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. Proc. of ATC 2008, LNCS, vol. 5060, pp. 100-105. Springer, Heidelberg (2008)
-
(2008)
Proc. of ATC 2008, LNCS
, vol.5060
, pp. 100-105
-
-
Yau, W.C.1
Heng, S.H.2
Goi, B.3
-
19
-
-
78751513797
-
An efficient public key encryption with conjunctive-subset keywords search
-
In Press, Corrected Proof
-
F. Zhang. An efficient public key encryption with conjunctive-subset keywords search. Journal of Network and Computer Applications. In Press, Corrected Proof, (2010).
-
(2010)
Journal of Network and Computer Applications
-
-
Zhang, F.1
-
20
-
-
38349070353
-
Generic combination of public key encryption with keyword search and public key encryption
-
R. Zhang and H. Imai. Generic combination of public key encryption with keyword search and public key encryption. Proc. of Cryptology and Network Security, 6th International Conference, CANS 2007, LNCS, vol. 4856, pp. 159-174. Springer, Heidelberg (2007)
-
(2007)
Proc. of Cryptology and Network Security, 6th International Conference, CANS 2007
, vol.4856
, pp. 159-174
-
-
Zhang, R.1
Imai, H.2
-
21
-
-
33745822106
-
On the security of multiple encryption or CCAsecurity+CCA-security=CCA-security?
-
R. Zhang, G. Hanaoka, J. Shikata, and H. Imai. On the security of multiple encryption or CCAsecurity+CCA-security=CCA-security? Proc. Of PKC 2004, LNCS, vol. 2947, pp. 360--374. Springer, Heidelberg(2004)
-
(2004)
Proc. Of PKC 2004, LNCS
, vol.2947
, pp. 360-374
-
-
Zhang, R.1
Hanaoka, G.2
Shikata, J.3
Imai, H.4
|