-
2
-
-
24944562007
-
Hierarchical Identity Based Encryption with Constant Size Ciphertext
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Boneh, D., Goh, E., Boyen, X.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005) (Pubitemid 41313968)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
3
-
-
35048901123
-
Public-key Encryption with Keyword Search
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public-key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
4
-
-
0037623983
-
Identity-based Encryption from the Weil Paring
-
Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Paring. SIAM Journal of Computing 32(3) (2003)
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
38049138213
-
Public Key Encryption That Allows PIR Queries
-
Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
-
Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith, W.: Public Key Encryption That Allows PIR Queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 50-67. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
Skeith, W.4
-
6
-
-
38049045519
-
Conjunctive, Subset, and Range Queries on Encrypted Data
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Boneh, D., Waters, B.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535-554. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
7
-
-
1642602228
-
Computationally Private Information Retrieval with Polylogarithmic Communication
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Cachin, C., Micali, S., Stadler, M.: Computationally Private Information Retrieval with Polylogarithmic Communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 402. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 402
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
8
-
-
67049154037
-
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Camenisch, J., Kohlweiss, M., Rial, A., Sheedy, C.: Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 196-214. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 196-214
-
-
Camenisch, J.1
Kohlweiss, M.2
Rial, A.3
Sheedy, C.4
-
9
-
-
26444507272
-
Privacy Preserving Keyword Searches on Remote Encrypted Data
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
Chang, Y., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005) (Pubitemid 41422132)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
10
-
-
0029541045
-
Private Information Retrieval
-
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private Information Retrieval. In: Proceedings of the 36th IEEE Symposium on Foundations of Computer Science (1995)
-
(1995)
Proceedings of the 36th IEEE Symposium on Foundations of Computer Science
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
11
-
-
34547240272
-
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
-
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. In: Proceedings of ACM Conference on Computer and Communications Security (2006)
-
(2006)
Proceedings of ACM Conference on Computer and Communications Security
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
12
-
-
38049029760
-
Encryption Techniques for Secure Database Outsourcing
-
Biskup, J., López, J. (eds.) ESORICS 2007. Springer, Heidelberg
-
Evdokimov, S., Günther, O.: Encryption Techniques for Secure Database Outsourcing. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 327-342. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 327-342
-
-
Evdokimov, S.1
Günther, O.2
-
13
-
-
33244488406
-
Secure Indexes
-
ePrint Archive: Report 2003/216
-
Goh, E.: Secure Indexes. Cryptology ePrint Archive: Report 2003/216 (2003), http://eprint.iacr.org/2003/216/
-
(2003)
Cryptology
-
-
Goh, E.1
-
15
-
-
0030149547
-
Software Protection and Simulation on Oblivious RAMs
-
Goldreich, O., Ostrovsky, R.: Software Protection and Simulation on Oblivious RAMs. Journal of ACM 43(3) (1996)
-
(1996)
Journal of ACM
, vol.43
, Issue.3
-
-
Goldreich, O.1
Ostrovsky, R.2
-
18
-
-
34548774576
-
Multi-Dimensional Range Query over Encrypted Data
-
Shi, E., Bethencourt, J., Chan, H., Song, D., Perrig, A.: Multi-Dimensional Range Query over Encrypted Data. In: Proceedings of IEEE Symposium on Security and Privacy (2007)
-
(2007)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Shi, E.1
Bethencourt, J.2
Chan, H.3
Song, D.4
Perrig, A.5
-
20
-
-
24944566040
-
Efficient Identity-Based Encryption Without Random Oracles
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
21
-
-
33750247597
-
Privacy-Preserving Queries on Encrypted Data
-
Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. Springer, Heidelberg
-
Yang, Z., Zhong, S., Wright, R.: Privacy-Preserving Queries on Encrypted Data. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 479-495. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4189
, pp. 479-495
-
-
Yang, Z.1
Zhong, S.2
Wright, R.3
|