메뉴 건너뛰기




Volumn 7, Issue 3, 2012, Pages 716-723

An enhanced searchable public key encryption scheme with a designated tester and its extensions

Author keywords

Decryptable; Designated tester; Keyword guessing attack; Re dpeks; Searchable public key encryption

Indexed keywords

DECRYPTABLE; DESIGNATED TESTER; KEYWORD GUESSING ATTACK; RE-DPEKS; SEARCHABLE PUBLIC KEY ENCRYPTIONS;

EID: 84859198768     PISSN: 1796203X     EISSN: None     Source Type: Journal    
DOI: 10.4304/jcp.7.3.716-723     Document Type: Article
Times cited : (49)

References (22)
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. Franklin: Identity-based encryption from the weil pairing. CRYPTO 2001:213-239.
    • (2001) CRYPTO , pp. 213-239
    • Boneh, D.1    Franklin, M.2
  • 3
    • 33749573228 scopus 로고    scopus 로고
    • Anonymous hierarchical identitybased encryption (without random oracles)
    • X. Boyen and B. Waters: Anonymous hierarchical identitybased encryption (without random oracles). CRYPTO 2006:290-307.
    • (2006) CRYPTO , pp. 290-307
    • Boyen, X.1    Waters, B.2
  • 4
    • 77952048540 scopus 로고    scopus 로고
    • Anonymity from asymmetry: New constructions for anonymous hibe
    • L. Ducas: Anonymity from asymmetry: New constructions for anonymous hibe. CT-RSA 2010:148-164.
    • (2010) CT-RSA , pp. 148-164
    • Ducas, L.1
  • 5
    • 33745134401 scopus 로고    scopus 로고
    • Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
    • M. Abdalla, M. Bellare and D. Catalano, et al.: Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. CRYPTO 2005:205-222.
    • (2005) CRYPTO , pp. 205-222
    • Abdalla, M.1    Bellare, M.2    Catalano, D.3
  • 6
    • 23944469009 scopus 로고    scopus 로고
    • Public key encryption with conjunctive field keyword search
    • D.J. Park, K. Kim, and P.J. Lee: Public key encryption with conjunctive field keyword search. WISA 2004:73-86.
    • (2004) WISA , pp. 73-86
    • Park, D.J.1    Kim, K.2    Lee, P.J.3
  • 7
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multiuser system
    • Y.H. Hwang and P.J. Lee: Public key encryption with conjunctive keyword search and its extension to a multiuser system. Pairing 2007:2-22.
    • (2007) Pairing , pp. 2-22
    • Hwang, Y.H.1    Lee, P.J.2
  • 8
    • 54249101916 scopus 로고    scopus 로고
    • Public key encryption with keyword search revisited
    • J. Baek, R. Safavi-Naini and W. Susilo: Public key encryption with keyword search revisited. ICCSA 2008:1249-1259.
    • (2008) ICCSA , pp. 1249-1259
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 9
    • 33750696320 scopus 로고    scopus 로고
    • Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
    • J.W. Byun, H.S. Rhee, H.A. Park, D.H. Lee: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. SDM 2006:75-83.
    • (2006) SDM , pp. 75-83
    • Byun, J.W.1    Rhee, H.S.2    Park, H.A.3    Lee, D.H.4
  • 10
    • 58249100325 scopus 로고    scopus 로고
    • Constructing PEKS schemes secure against keyword guessing attacks is possible?
    • I.R. Jeong, J.K. Kwon, D. Hong, D.H. Lee: Constructing PEKS schemes secure against keyword guessing attacks is possible?. Computer Communications 32(2):394-396(2009).
    • (2009) Computer Communications , vol.32 , Issue.2 , pp. 394-396
    • Jeong, I.R.1    Kwon, J.K.2    Hong, D.3    Lee, D.H.4
  • 11
    • 64949106593 scopus 로고    scopus 로고
    • Secure searchable public key encryption scheme against keyword guessing attacks
    • H.S. Rhee, W. Susilo and H.J. Kim: Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electronics Express 6(5):237-243(2009).
    • (2009) IEICE Electronics Express , vol.6 , Issue.5 , pp. 237-243
    • Rhee, H.S.1    Susilo, W.2    Kim, H.J.3
  • 12
    • 71549160150 scopus 로고    scopus 로고
    • Improved Searchable Public Key Encryption with Designated Tester
    • H.S. Rhee, J.H. Park, W. Susilo, D.H. Lee: Improved Searchable Public Key Encryption with Designated Tester. ASIACCS 2009:376-379.
    • (2009) ASIACCS , pp. 376-379
    • Rhee, H.S.1    Park, J.H.2    Susilo, W.3    Lee, D.H.4
  • 14
    • 38149055585 scopus 로고    scopus 로고
    • Decryptable searchable encryption
    • T. Fuhr and P. Paillier: Decryptable searchable encryption. ProvSec 2007:228-236.
    • (2007) ProvSec , pp. 228-236
    • Fuhr, T.1    Paillier, P.2
  • 16
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • M. Blaze, G. Bleumer, M. Strauss: Divertible protocols and atomic proxy cryptography. Eurocypt 1998:127-144.
    • (1998) Eurocypt , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 17
    • 78650766918 scopus 로고    scopus 로고
    • Proxy Re-encryption with Keyword Search:New Definitions and Algorithms
    • W.C. Yau, R.W. Phan, S.H. Heng and B.M. Goi: Proxy Re-encryption with Keyword Search:New Definitions and Algorithms. SecTech/DRBC 2010:149-160.
    • (2010) SecTech/DRBC , pp. 149-160
    • Yau, W.C.1    Phan, R.W.2    Heng, S.H.3    Goi, B.M.4
  • 19
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairingbased cryptosystems
    • P. Barreto, H. Kim, B. Lynn and M. Scott: Efficient algorithms for pairingbased cryptosystems. Crypto 2002:354-368.
    • (2002) Crypto , pp. 354-368
    • Barreto, P.1    Kim, H.2    Lynn, B.3    Scott, M.4
  • 20
    • 84937579774 scopus 로고    scopus 로고
    • DHIES: An encryption scheme based on the DiffieCHellman problem
    • M. Abdalla, M. Bellare, P. Rogaway: DHIES: an encryption scheme based on the DiffieCHellman problem. CTRSA 2001:143-158.
    • (2001) CTRSA , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 21
    • 78449236216 scopus 로고    scopus 로고
    • Public-Key Encryption with Registered Keyword Search
    • Q. Tang and L. Chen: Public-Key Encryption with Registered Keyword Search. EuroPKI 2009:163-178.
    • (2009) EuroPKI , pp. 163-178
    • Tang, Q.1    Chen, L.2
  • 22
    • 77950864045 scopus 로고    scopus 로고
    • Proxy re-encryption with keyword search
    • J. Shao, Z. Cao, X. Liang, H. Lin: Proxy re-encryption with keyword search. Inf. Sci. 180(13):2576-2587(2010).
    • (2010) Inf. Sci , vol.180 , Issue.13 , pp. 2576-2587
    • Shao, J.1    Cao, Z.2    Liang, X.3    Lin, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.