-
2
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. Franklin: Identity-based encryption from the weil pairing. CRYPTO 2001:213-239.
-
(2001)
CRYPTO
, pp. 213-239
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
33749573228
-
Anonymous hierarchical identitybased encryption (without random oracles)
-
X. Boyen and B. Waters: Anonymous hierarchical identitybased encryption (without random oracles). CRYPTO 2006:290-307.
-
(2006)
CRYPTO
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
4
-
-
77952048540
-
Anonymity from asymmetry: New constructions for anonymous hibe
-
L. Ducas: Anonymity from asymmetry: New constructions for anonymous hibe. CT-RSA 2010:148-164.
-
(2010)
CT-RSA
, pp. 148-164
-
-
Ducas, L.1
-
5
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
-
M. Abdalla, M. Bellare and D. Catalano, et al.: Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. CRYPTO 2005:205-222.
-
(2005)
CRYPTO
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
-
6
-
-
23944469009
-
Public key encryption with conjunctive field keyword search
-
D.J. Park, K. Kim, and P.J. Lee: Public key encryption with conjunctive field keyword search. WISA 2004:73-86.
-
(2004)
WISA
, pp. 73-86
-
-
Park, D.J.1
Kim, K.2
Lee, P.J.3
-
7
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multiuser system
-
Y.H. Hwang and P.J. Lee: Public key encryption with conjunctive keyword search and its extension to a multiuser system. Pairing 2007:2-22.
-
(2007)
Pairing
, pp. 2-22
-
-
Hwang, Y.H.1
Lee, P.J.2
-
8
-
-
54249101916
-
Public key encryption with keyword search revisited
-
J. Baek, R. Safavi-Naini and W. Susilo: Public key encryption with keyword search revisited. ICCSA 2008:1249-1259.
-
(2008)
ICCSA
, pp. 1249-1259
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
9
-
-
33750696320
-
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
-
J.W. Byun, H.S. Rhee, H.A. Park, D.H. Lee: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. SDM 2006:75-83.
-
(2006)
SDM
, pp. 75-83
-
-
Byun, J.W.1
Rhee, H.S.2
Park, H.A.3
Lee, D.H.4
-
10
-
-
58249100325
-
Constructing PEKS schemes secure against keyword guessing attacks is possible?
-
I.R. Jeong, J.K. Kwon, D. Hong, D.H. Lee: Constructing PEKS schemes secure against keyword guessing attacks is possible?. Computer Communications 32(2):394-396(2009).
-
(2009)
Computer Communications
, vol.32
, Issue.2
, pp. 394-396
-
-
Jeong, I.R.1
Kwon, J.K.2
Hong, D.3
Lee, D.H.4
-
11
-
-
64949106593
-
Secure searchable public key encryption scheme against keyword guessing attacks
-
H.S. Rhee, W. Susilo and H.J. Kim: Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electronics Express 6(5):237-243(2009).
-
(2009)
IEICE Electronics Express
, vol.6
, Issue.5
, pp. 237-243
-
-
Rhee, H.S.1
Susilo, W.2
Kim, H.J.3
-
12
-
-
71549160150
-
Improved Searchable Public Key Encryption with Designated Tester
-
H.S. Rhee, J.H. Park, W. Susilo, D.H. Lee: Improved Searchable Public Key Encryption with Designated Tester. ASIACCS 2009:376-379.
-
(2009)
ASIACCS
, pp. 376-379
-
-
Rhee, H.S.1
Park, J.H.2
Susilo, W.3
Lee, D.H.4
-
14
-
-
38149055585
-
Decryptable searchable encryption
-
T. Fuhr and P. Paillier: Decryptable searchable encryption. ProvSec 2007:228-236.
-
(2007)
ProvSec
, pp. 228-236
-
-
Fuhr, T.1
Paillier, P.2
-
16
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
M. Blaze, G. Bleumer, M. Strauss: Divertible protocols and atomic proxy cryptography. Eurocypt 1998:127-144.
-
(1998)
Eurocypt
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
17
-
-
78650766918
-
Proxy Re-encryption with Keyword Search:New Definitions and Algorithms
-
W.C. Yau, R.W. Phan, S.H. Heng and B.M. Goi: Proxy Re-encryption with Keyword Search:New Definitions and Algorithms. SecTech/DRBC 2010:149-160.
-
(2010)
SecTech/DRBC
, pp. 149-160
-
-
Yau, W.C.1
Phan, R.W.2
Heng, S.H.3
Goi, B.M.4
-
19
-
-
84937428623
-
Efficient algorithms for pairingbased cryptosystems
-
P. Barreto, H. Kim, B. Lynn and M. Scott: Efficient algorithms for pairingbased cryptosystems. Crypto 2002:354-368.
-
(2002)
Crypto
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
20
-
-
84937579774
-
DHIES: An encryption scheme based on the DiffieCHellman problem
-
M. Abdalla, M. Bellare, P. Rogaway: DHIES: an encryption scheme based on the DiffieCHellman problem. CTRSA 2001:143-158.
-
(2001)
CTRSA
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
21
-
-
78449236216
-
Public-Key Encryption with Registered Keyword Search
-
Q. Tang and L. Chen: Public-Key Encryption with Registered Keyword Search. EuroPKI 2009:163-178.
-
(2009)
EuroPKI
, pp. 163-178
-
-
Tang, Q.1
Chen, L.2
-
22
-
-
77950864045
-
Proxy re-encryption with keyword search
-
J. Shao, Z. Cao, X. Liang, H. Lin: Proxy re-encryption with keyword search. Inf. Sci. 180(13):2576-2587(2010).
-
(2010)
Inf. Sci
, vol.180
, Issue.13
, pp. 2576-2587
-
-
Shao, J.1
Cao, Z.2
Liang, X.3
Lin, H.4
|