-
1
-
-
43449138479
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
DOI 10.1007/s00145-007-9006-6
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions Journal of Cryptology 21 3 2008 350 391 (Pubitemid 351667021)
-
(2008)
Journal of Cryptology
, vol.21
, Issue.3
, pp. 350-391
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
84946837370
-
Key-Privacy in Public-Key Encryption
-
Advances in Cryptology - ASIACRYPT 2001
-
D. Boneh, A. Boldyreva, A. Desai, D. Pointcheval, Key-privacy in public-key encryption, in: Proceedings of Asiacrypt'01, LNCS 2248, 2001, pp. 566-582. (Pubitemid 33371207)
-
(2002)
Lecture Notes in Computer Science
, Issue.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
3
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in Proceedings of Eurocrypt'04, LNCS 3027, 2004, pp. 506-522.
-
(2004)
Proceedings of Eurocrypt'04, LNCS 3027
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
4
-
-
33745854208
-
Chosen-ciphertext security from identity-based encryption
-
D. Boneh, R. Canetti, S. Halevi, and J. Katz Chosen-ciphertext security from identity-based encryption SIAM Journal of Computing(SICOMP) 36 5 2006 915 942
-
(2006)
SIAM Journal of Computing(SICOMP)
, vol.36
, Issue.5
, pp. 915-942
-
-
Boneh, D.1
Canetti, R.2
Halevi, S.3
Katz, J.4
-
5
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, in: Proceedings of Crypto'01, LNCS 2139, 2001, pp. 213-229. (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
54249101916
-
Public key encryption with keyword search revisited
-
J. Baek, R. Safavi-Naini, W. Susilo, Public key encryption with keyword search revisited, in: Proceedings of ACIS'06, LNCS 5072, 2006, pp. 1249-1259.
-
(2006)
Proceedings of ACIS'06, LNCS 5072
, pp. 1249-1259
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
7
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (Without random oracles)
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
X. Boyen, B. Waters, Anonymous hierarchical identity-based encryption (without random Oracles), in: Proceedings of Crypto'06, LNCS 4392, 2006, pp. 290-307. (Pubitemid 44532122)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
8
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh, B. Waters, Conjunctive, subset, and range queries on encrypted data, in: Proceedings of TCC'07, LNCS 4392, 2007, pp. 535-554.
-
(2007)
Proceedings of TCC'07, LNCS 4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
9
-
-
0032201622
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan Private information retrieval Journal of the ACM 45 6 1998 965 981
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
10
-
-
71549153479
-
A secure channel free public key encryption with keyword search scheme without random oracle
-
L. Fang, W. Susilo, C. Ge, J. Wang, A secure channel free public key encryption with keyword search scheme without random oracle, in: Proceedings of ProvSec'09, LNCS 5888, 2009, pp. 248-258.
-
(2009)
Proceedings of ProvSec'09, LNCS 5888
, pp. 248-258
-
-
Fang, L.1
Susilo, W.2
Ge, C.3
Wang, J.4
-
11
-
-
70349557354
-
Hierarchical ID-based cryptography
-
C. Gentry, A. Silverberg, Hierarchical ID-based cryptography, in: Proceedings of ASIACRYPT 2002, LNCS 2501, 2002, pp. 548-566.
-
(2002)
Proceedings of ASIACRYPT 2002, LNCS 2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
12
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
J. Horwitz, B. Lynn, Toward hierarchical identity-based encryption, in: Proceedings of EUROCRYPT 2002, LNCS 2332, 2002, pp. 466-481.
-
(2002)
Proceedings of EUROCRYPT 2002, LNCS 2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
13
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Y.H. Hwang, P.J. Lee, Public key encryption with conjunctive keyword search and its extension to a multi-user system, in: Proceedings of Pairing 2007, LNCS 4575, 2007, pp. 2-22.
-
(2007)
Proceedings of Pairing 2007, LNCS 4575
, pp. 2-22
-
-
Hwang, Y.H.1
Lee, P.J.2
-
14
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
DOI 10.1007/978-3-540-78967-3-9, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
J. Katz, A. Sahai, B. Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products, in: Proceedings of Eurocrypt'08, LNCS 4965, 2008, pp. 146-162. (Pubitemid 351762828)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
15
-
-
23944469009
-
Public key encryption with conjunctive field keyword search
-
D. Park, K. Kim, P. Lee, Public key encryption with conjunctive field keyword search, in: Proceedings of WISA'04, LNCS 3325, 2004, pp. 73-86.
-
(2004)
Proceedings of WISA'04, LNCS 3325
, pp. 73-86
-
-
Park, D.1
Kim, K.2
Lee, P.3
-
16
-
-
84861574738
-
Oblivious conjunctive keyword search
-
H.S. Rhee, J.W. Byun, D.H. Lee, J. Lim, Oblivious conjunctive keyword search, in: Proceedings of WISA'05, LNCS 3886, 2006, pp. 535-554.
-
(2006)
Proceedings of WISA'05, LNCS 3886
, pp. 535-554
-
-
Rhee, H.S.1
Byun, J.W.2
Lee, D.H.3
Lim, J.4
-
17
-
-
71549160150
-
Improved searchable public key encryption with designated tester
-
H.S. Rhee, J.H. Park, W. Susilo, D.H. Lee, Improved searchable public key encryption with designated tester, in: Proceedings of ASIACCS 2009, 2009, pp. 376-379.
-
(2009)
Proceedings of ASIACCS 2009
, pp. 376-379
-
-
Rhee, H.S.1
Park, J.H.2
Susilo, W.3
Lee, D.H.4
-
18
-
-
77649179760
-
Trapdoor security in a searchable public-key encryption scheme with a designated tester
-
H.S. Rhee, J.H. Park, W. Susilo, and D.H. Lee Trapdoor security in a searchable public-key encryption scheme with a designated tester Journal of Systems and Software 83 5 2010 763 771
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.5
, pp. 763-771
-
-
Rhee, H.S.1
Park, J.H.2
Susilo, W.3
Lee, D.H.4
-
19
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, Identity-based cryptosystems and signature schemes, in: Proceedings of CRYPTO84, LNCS 196, 1984, pp. 47-53.
-
(1984)
Proceedings of CRYPTO84, LNCS 196
, pp. 47-53
-
-
Shamir, A.1
-
20
-
-
77950864045
-
Proxy re-encryption with keyword search
-
J. Shao, Z. Cao, X. Liang, and H. Lin Proxy re-encryption with keyword search Information Sciences 180 13(1) 2010 2576 2587
-
(2010)
Information Sciences
, vol.180
, Issue.131
, pp. 2576-2587
-
-
Shao, J.1
Cao, Z.2
Liang, X.3
Lin, H.4
-
21
-
-
67049108616
-
Anonymous hierarchical identity-based encryption with constant size ciphertexts
-
J.H. Seo, T. Kobayashi, M. Ohkubo, K. Suzuki, Anonymous hierarchical identity-based encryption with constant size ciphertexts, in: Proceedings of PKC09, LNCS 5443, 2009, pp. 215-234.
-
(2009)
Proceedings of PKC09, LNCS 5443
, pp. 215-234
-
-
Seo, J.H.1
Kobayashi, T.2
Ohkubo, M.3
Suzuki, K.4
-
22
-
-
70350649061
-
Predicate privacy in encryption systems
-
E. Shen, E. Shi, B. Waters, Predicate privacy in encryption systems, in: Proceedings of TCC09, 2009, pp. 457-473.
-
(2009)
Proceedings of TCC09
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
|