메뉴 건너뛰기




Volumn , Issue , 2011, Pages

PEKSrand: Providing predicate privacy in public-key encryption with keyword search

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION OVERHEADS; EXISTING SYSTEMS; GUESSING ATTACKS; KEYWORD SEARCH; PUBLIC KEYS; PUBLIC-KEY ENCRYPTION; STATISTICAL DISTRIBUTION; STORAGE EFFICIENCY; SYMMETRIC KEYS;

EID: 80052165941     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icc.2011.5962452     Document Type: Conference Paper
Times cited : (26)

References (15)
  • 3
    • 33750696320 scopus 로고    scopus 로고
    • Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
    • Secure Data Management 2006, ser.
    • J. W. Byun, H. S. Rhee, H.-A. Park, and D. H. Lee, "Off-line keyword guessing attacks on recent keyword search schemes over encrypted data," in Secure Data Management 2006, ser. Lecture Notes in Computer Science, vol. 4165, pp. 75-83.
    • Lecture Notes in Computer Science , vol.4165 , pp. 75-83
    • Byun, J.W.1    Rhee, H.S.2    Park, H.-A.3    Lee, D.H.4
  • 4
    • 43449138479 scopus 로고    scopus 로고
    • Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
    • M. Abdalla et al., "Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions," Journal of Cryptology, vol. 21, no. 3, pp. 350-391, 2008.
    • (2008) Journal of Cryptology , vol.21 , Issue.3 , pp. 350-391
    • Abdalla, M.1
  • 5
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • 6th Theory of Cryptography Conference 2009, ser.
    • E. Shen, E. Shi, and B. Waters, "Predicate privacy in encryption systems," in 6th Theory of Cryptography Conference 2009, ser. Lecture Notes in Computer Science, vol. 5444, 2009, pp. 457-473.
    • (2009) Lecture Notes in Computer Science , vol.5444 , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 9
    • 80052147709 scopus 로고    scopus 로고
    • Peksrand: Providing predicate privacy in public-key encryption with keyword search
    • Report 2010/466
    • B. Zhu, B. Zhu, and K. Ren, "Peksrand: Providing predicate privacy in public-key encryption with keyword search," Cryptology ePrint Archive, Report 2010/466.
    • Cryptology EPrint Archive
    • Zhu, B.1    Zhu, B.2    Ren, K.3
  • 11
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," SIAM J. of Computing, vol. 32, no. 3, pp. 586-615, 2003.
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 13
    • 22944464423 scopus 로고    scopus 로고
    • The Enron corpus: A new dataset for email classification research
    • European Conference on Machine Learning 2004, ser.
    • B. Klimt and Y. Yang, "The Enron corpus: A new dataset for email classification research," in European Conference on Machine Learning 2004, ser. Lecture Notes in Computer Science, vol. 3201, 2004, pp. 217-226.
    • (2004) Lecture Notes in Computer Science , vol.3201 , pp. 217-226
    • Klimt, B.1    Yang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.