메뉴 건너뛰기




Volumn 4, Issue 9, 2010, Pages 141-150

Decryptable public key encryption with keyword search schemes

Author keywords

Information security; Public key encryption with keyword search; Without random oracle

Indexed keywords

SEARCH ENGINES; SECURITY OF DATA;

EID: 78751554019     PISSN: 19759339     EISSN: None     Source Type: Journal    
DOI: 10.4156/jdcta.vol4.issue9.17     Document Type: Article
Times cited : (16)

References (21)
  • 2
    • 54249101916 scopus 로고    scopus 로고
    • In Proc. of Applied Cryptography and Information Security 06 (ACIS 2006), LNCS, Springer, Heidelberg
    • J. Baek, R. Safavi-Naini and W. Susilo. Public Key Encryption with Keyword Search Revisited. In Proc. of Applied Cryptography and Information Security 06 (ACIS 2006), LNCS, vol. 5072, pp. 1249 -1259. Springer, Heidelberg(2008)
    • (2008) Public Key Encryption With Keyword Search Revisited , vol.5072 , pp. 1249-1259
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 9
    • 38149055585 scopus 로고    scopus 로고
    • In ProvSec 2007, LNCS, Springer, Heidelberg
    • T. Fuhr and P. Paillier. Decryptable searchable encryption. In ProvSec 2007, LNCS, vol. 4784, pp. 228-236. Springer, Heidelberg(2007)
    • (2007) Decryptable Searchable Encryption , vol.4784 , pp. 228-236
    • Fuhr, T.1    Paillier, P.2
  • 13
    • 33745120364 scopus 로고    scopus 로고
    • Secure Conjunctive Search over Encrypted Data
    • In: Jakobsson, M., Yung, M., Zhou, J. (eds.), Springer, Heidelberg
    • P. Golle, J. Staddon, B. Waters. Secure Conjunctive Search over Encrypted Data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) Proc. ACNS 2004. LNCS, vol. 3089, pp. 31-45. Springer, Heidelberg (2004)
    • (2004) Proc. ACNS 2004. LNCS , vol.3089 , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.3
  • 14
    • 58249100325 scopus 로고    scopus 로고
    • Constructing PEKS schemes secure against keyword guessing attacks is possible?
    • I. R. Jeong, J. O. Kwon, D. Hong, and D. H. Lee. Constructing PEKS schemes secure against keyword guessing attacks is possible? Computer Communications. Express, Vol. 32, No. 2, p.394-396, (2009).
    • (2009) Computer Communications. Express , vol.32 , Issue.2 , pp. 394-396
    • Jeong, I.R.1    Kwon, J.O.2    Hong, D.3    Lee, D.H.4
  • 15
    • 64949106593 scopus 로고    scopus 로고
    • Secure searchable public key encryption scheme against keyword guessing attacks
    • Express
    • H. S. Rhee, W. Susilo and H-J. Kim. Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron. Express, Vol. 6, No. 5, pp.237-243, (2009).
    • (2009) IEICE Electron , vol.6 , Issue.5 , pp. 237-243
    • Rhee, H.S.1    Susilo, W.2    Kim, H.-J.3
  • 18
    • 48249091242 scopus 로고    scopus 로고
    • Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes
    • Springer, Heidelberg
    • W. C. Yau, S. H. Heng and B. Goi. Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. Proc. of ATC 2008, LNCS, vol. 5060, pp. 100-105. Springer, Heidelberg (2008)
    • (2008) Proc. of ATC 2008, LNCS , vol.5060 , pp. 100-105
    • Yau, W.C.1    Heng, S.H.2    Goi, B.3
  • 19
    • 78751513797 scopus 로고    scopus 로고
    • An efficient public key encryption with conjunctive-subset keywords search
    • In Press, Corrected Proof
    • F. Zhang. An efficient public key encryption with conjunctive-subset keywords search. Journal of Network and Computer Applications. In Press, Corrected Proof, (2010).
    • (2010) Journal of Network and Computer Applications
    • Zhang, F.1
  • 21
    • 33745822106 scopus 로고    scopus 로고
    • On the security of multiple encryption or CCAsecurity+CCA-security=CCA-security?
    • R. Zhang, G. Hanaoka, J. Shikata, and H. Imai. On the security of multiple encryption or CCAsecurity+CCA-security=CCA-security? Proc. Of PKC 2004, LNCS, vol. 2947, pp. 360--374. Springer, Heidelberg(2004)
    • (2004) Proc. Of PKC 2004, LNCS , vol.2947 , pp. 360-374
    • Zhang, R.1    Hanaoka, G.2    Shikata, J.3    Imai, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.