메뉴 건너뛰기




Volumn 205, Issue , 2012, Pages 93-109

Generic construction of designated tester public-key encryption with keyword search

Author keywords

Data security; Designated tester; Searchable public key encryption

Indexed keywords

DESIGNATED TESTER; GENERIC CONSTRUCTION; GENERIC METHOD; GENERIC TRANSFORMATIONS; IDENTITY BASED ENCRYPTION; KEYWORD SEARCH; PUBLIC KEYS; PUBLIC-KEY ENCRYPTION;

EID: 84861580700     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2012.03.020     Document Type: Article
Times cited : (58)

References (22)
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, in: Proceedings of Crypto'01, LNCS 2139, 2001, pp. 213-229. (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh, B. Waters, Conjunctive, subset, and range queries on encrypted data, in: Proceedings of TCC'07, LNCS 4392, 2007, pp. 535-554.
    • (2007) Proceedings of TCC'07, LNCS 4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 10
    • 71549153479 scopus 로고    scopus 로고
    • A secure channel free public key encryption with keyword search scheme without random oracle
    • L. Fang, W. Susilo, C. Ge, J. Wang, A secure channel free public key encryption with keyword search scheme without random oracle, in: Proceedings of ProvSec'09, LNCS 5888, 2009, pp. 248-258.
    • (2009) Proceedings of ProvSec'09, LNCS 5888 , pp. 248-258
    • Fang, L.1    Susilo, W.2    Ge, C.3    Wang, J.4
  • 13
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Y.H. Hwang, P.J. Lee, Public key encryption with conjunctive keyword search and its extension to a multi-user system, in: Proceedings of Pairing 2007, LNCS 4575, 2007, pp. 2-22.
    • (2007) Proceedings of Pairing 2007, LNCS 4575 , pp. 2-22
    • Hwang, Y.H.1    Lee, P.J.2
  • 15
    • 23944469009 scopus 로고    scopus 로고
    • Public key encryption with conjunctive field keyword search
    • D. Park, K. Kim, P. Lee, Public key encryption with conjunctive field keyword search, in: Proceedings of WISA'04, LNCS 3325, 2004, pp. 73-86.
    • (2004) Proceedings of WISA'04, LNCS 3325 , pp. 73-86
    • Park, D.1    Kim, K.2    Lee, P.3
  • 18
    • 77649179760 scopus 로고    scopus 로고
    • Trapdoor security in a searchable public-key encryption scheme with a designated tester
    • H.S. Rhee, J.H. Park, W. Susilo, and D.H. Lee Trapdoor security in a searchable public-key encryption scheme with a designated tester Journal of Systems and Software 83 5 2010 763 771
    • (2010) Journal of Systems and Software , vol.83 , Issue.5 , pp. 763-771
    • Rhee, H.S.1    Park, J.H.2    Susilo, W.3    Lee, D.H.4
  • 19
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir, Identity-based cryptosystems and signature schemes, in: Proceedings of CRYPTO84, LNCS 196, 1984, pp. 47-53.
    • (1984) Proceedings of CRYPTO84, LNCS 196 , pp. 47-53
    • Shamir, A.1
  • 20
    • 77950864045 scopus 로고    scopus 로고
    • Proxy re-encryption with keyword search
    • J. Shao, Z. Cao, X. Liang, and H. Lin Proxy re-encryption with keyword search Information Sciences 180 13(1) 2010 2576 2587
    • (2010) Information Sciences , vol.180 , Issue.131 , pp. 2576-2587
    • Shao, J.1    Cao, Z.2    Liang, X.3    Lin, H.4
  • 21
    • 67049108616 scopus 로고    scopus 로고
    • Anonymous hierarchical identity-based encryption with constant size ciphertexts
    • J.H. Seo, T. Kobayashi, M. Ohkubo, K. Suzuki, Anonymous hierarchical identity-based encryption with constant size ciphertexts, in: Proceedings of PKC09, LNCS 5443, 2009, pp. 215-234.
    • (2009) Proceedings of PKC09, LNCS 5443 , pp. 215-234
    • Seo, J.H.1    Kobayashi, T.2    Ohkubo, M.3    Suzuki, K.4
  • 22
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • E. Shen, E. Shi, B. Waters, Predicate privacy in encryption systems, in: Proceedings of TCC09, 2009, pp. 457-473.
    • (2009) Proceedings of TCC09 , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.