메뉴 건너뛰기




Volumn 6711 LNCS, Issue , 2011, Pages 61-76

Searchable encryption for outsourced data analytics

Author keywords

[No Author keywords available]

Indexed keywords

DATA ANALYSTS; DATA ANALYTICS; DIFFIE-HELLMAN ASSUMPTION; EFFICIENT CONSTRUCTION; ENCRYPTION SCHEMES; ITS DATA; PRIVACY REQUIREMENTS; QUERY RESULTS; RANDOM ORACLE MODEL; RANGE QUERY;

EID: 80052795544     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22633-5_5     Document Type: Conference Paper
Times cited : (8)

References (21)
  • 2
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical Identity Based Encryption with Constant Size Ciphertext
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Boneh, D., Goh, E., Boyen, X.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005) (Pubitemid 41313968)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 3
    • 35048901123 scopus 로고    scopus 로고
    • Public-key Encryption with Keyword Search
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public-key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 4
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based Encryption from the Weil Paring
    • Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Paring. SIAM Journal of Computing 32(3) (2003)
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3
    • Boneh, D.1    Franklin, M.2
  • 5
    • 38049138213 scopus 로고    scopus 로고
    • Public Key Encryption That Allows PIR Queries
    • Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
    • Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith, W.: Public Key Encryption That Allows PIR Queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 50-67. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 50-67
    • Boneh, D.1    Kushilevitz, E.2    Ostrovsky, R.3    Skeith, W.4
  • 6
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, Subset, and Range Queries on Encrypted Data
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Boneh, D., Waters, B.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535-554. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 7
    • 1642602228 scopus 로고    scopus 로고
    • Computationally Private Information Retrieval with Polylogarithmic Communication
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Cachin, C., Micali, S., Stadler, M.: Computationally Private Information Retrieval with Polylogarithmic Communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 402. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 402
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 8
    • 67049154037 scopus 로고    scopus 로고
    • Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
    • Camenisch, J., Kohlweiss, M., Rial, A., Sheedy, C.: Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 196-214. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 196-214
    • Camenisch, J.1    Kohlweiss, M.2    Rial, A.3    Sheedy, C.4
  • 9
    • 26444507272 scopus 로고    scopus 로고
    • Privacy Preserving Keyword Searches on Remote Encrypted Data
    • Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
    • Chang, Y., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005) (Pubitemid 41422132)
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 442-455
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 12
    • 38049029760 scopus 로고    scopus 로고
    • Encryption Techniques for Secure Database Outsourcing
    • Biskup, J., López, J. (eds.) ESORICS 2007. Springer, Heidelberg
    • Evdokimov, S., Günther, O.: Encryption Techniques for Secure Database Outsourcing. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 327-342. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734 , pp. 327-342
    • Evdokimov, S.1    Günther, O.2
  • 13
    • 33244488406 scopus 로고    scopus 로고
    • Secure Indexes
    • ePrint Archive: Report 2003/216
    • Goh, E.: Secure Indexes. Cryptology ePrint Archive: Report 2003/216 (2003), http://eprint.iacr.org/2003/216/
    • (2003) Cryptology
    • Goh, E.1
  • 15
    • 0030149547 scopus 로고    scopus 로고
    • Software Protection and Simulation on Oblivious RAMs
    • Goldreich, O., Ostrovsky, R.: Software Protection and Simulation on Oblivious RAMs. Journal of ACM 43(3) (1996)
    • (1996) Journal of ACM , vol.43 , Issue.3
    • Goldreich, O.1    Ostrovsky, R.2
  • 20
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption Without Random Oracles
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 21
    • 33750247597 scopus 로고    scopus 로고
    • Privacy-Preserving Queries on Encrypted Data
    • Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. Springer, Heidelberg
    • Yang, Z., Zhong, S., Wright, R.: Privacy-Preserving Queries on Encrypted Data. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 479-495. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4189 , pp. 479-495
    • Yang, Z.1    Zhong, S.2    Wright, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.