-
1
-
-
35248851617
-
Correlation-resistant storage via keyword-searchable encryption
-
Ballard, L., Green, M., de Medeiros, B. and Monrose, F. (2005) 'Correlation-resistant storage via keyword-searchable encryption', Tech. Rep. Report 2005/417, IACR, available at http://eprint.iacr.org/2005/417.
-
(2005)
Tech. Rep. Report 2005/417, IACR
-
-
Ballard, L.1
Green, M.2
De Medeiros, B.3
Monrose, F.4
-
3
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Advances in Cryptology - CRYPTO '98
-
Bellare, M., Desai, A., Pointcheval, D. and Rogaway, P. (1998) 'Relations among notions of security for public-key encryption schemes', in Krawczyk, H. (Ed.): Advances in Cryptology - CRYPTO 1998, LNCS, Vol. 1462, pp. 26-45, Springer. (Pubitemid 128118995)
-
(1998)
Lecture Notes in Computer Science
, Issue.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
4
-
-
17744380057
-
Coin flipping by telephone a protocol for solving impossible problems
-
Blum, M. (1983) 'Coin flipping by telephone a protocol for solving impossible problems', SIGACT News, Vol. 15, No. 1, pp. 23-27.
-
(1983)
SIGACT News
, vol.15
, Issue.1
, pp. 23-27
-
-
Blum, M.1
-
5
-
-
84958639277
-
Efficient generation of shared RSA keys
-
Advances in Cryptology - CRYPTO '97
-
Boneh, D. and Franklin, M.K. (1997) 'Efficient generation of shared RSA keys (extended abstract)', in Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, pp. 425-439. (Pubitemid 127112570)
-
(1997)
Lecture Notes in Computer Science
, Issue.1294
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
35048887476
-
Short group signatures
-
Franklin, M.K. (Ed.) Springer
-
Boneh, D., Boyen, X. and Shacham, H. (2004a) 'Short group signatures', in Franklin, M.K. (Ed.): Advances in Cryptology - CRYPTO 2004, LNCS, Vol. 3152, pp. 41-55, Springer.
-
(2004)
Advances in Cryptology - CRYPTO 2004, LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
7
-
-
35048901123
-
Public key encryption with keyword search
-
Cachin, C. and Camenisch, J. (Eds.) LNCS, 3027 Springer
-
Boneh, D., Crescenzo, G.D., Ostrovsky, R. and Persiano, G. (2004b) 'Public key encryption with keyword search', in Cachin, C. and Camenisch, J. (Eds.): Advances in Cryptology - EUROCRYPT 2004, LNCS, Vol. 3027, pp. 506-522, Springer.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
8
-
-
52149104493
-
The uber-assumption family
-
Galbraith, S.D. and Paterson, K.G. (Eds.) LNCS, 5209 Springer
-
Boyen, X. (2008) 'The uber-assumption family', in Galbraith, S.D. and Paterson, K.G. (Eds.): Pairing-Based Cryptography - Pairing 2008, LNCS, Vol. 5209, pp. 39-56, Springer.
-
(2008)
Pairing-based Cryptography - Pairing 2008
, pp. 39-56
-
-
Boyen, X.1
-
9
-
-
33750696320
-
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
-
Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings
-
Byun, J.W., Rhee, H.S., Park, H. and Lee, D.H. (2006) 'Off-line keyword guessing attacks on recent keyword search schemes over encrypted data', in Jonker, W. and Petkovic, M. (Eds.): Secure Data Management, Third VLDB Workshop, SDM 2006, LNCS, Vol. 4165, pp. 75-83, Springer. (Pubitemid 44699624)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4165
, pp. 75-83
-
-
Byun, J.W.1
Rhee, H.S.2
Park, H.-A.3
Lee, D.H.4
-
10
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Blakley, G.R. and Chaum, D. (Eds.) LNCS, 196
-
ElGamal, T. (1984) 'A public key cryptosystem and a signature scheme based on discrete logarithms', in Blakley, G.R. and Chaum, D. (Eds.): Advances in Cryptology - CRYPTO 1984, LNCS, Vol. 196, pp. 10-18.
-
(1984)
Advances in Cryptology - CRYPTO 1984
, pp. 10-18
-
-
ElGamal, T.1
-
11
-
-
35048820609
-
Efficient private matching and set intersection
-
LNCS, 3027 Springer
-
Freedman, M.J., Nissim, K. and Pinkas, B. (2004) 'Efficient private matching and set intersection', in Advances in Cryptology - EUROCRYPT 2004, LNCS, Vol. 3027, pp. 1-19, Springer.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
12
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Takagi, T., Okamoto, T., Okamoto, E. and Okamoto, T. (Eds.) LNCS, 4575 Springer
-
Hwang, Y.H. and Lee, P.J. (2007) 'Public key encryption with conjunctive keyword search and its extension to a multi-user system', in Takagi, T., Okamoto, T., Okamoto, E. and Okamoto, T. (Eds.): Pairing-Based Cryptography - Pairing 2007, LNCS, Vol. 4575, pp. 2-22, Springer.
-
(2007)
Pairing-based Cryptography - Pairing 2007
, pp. 2-22
-
-
Hwang, Y.H.1
Lee, P.J.2
-
13
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (Ed.) LNCS, 1592
-
Paillier, P. (1999) 'Public-key cryptosystems based on composite degree residuosity classes', in Stern, J. (Ed.): Advances in Cryptology -EUROCRYPT 1999, LNCS, Vol. 1592, pp. 223-238.
-
(1999)
Advances in Cryptology -EUROCRYPT 1999
, pp. 223-238
-
-
Paillier, P.1
-
14
-
-
0010602889
-
Time-lock puzzles and timed-release crypto
-
Rivest, R.L., Shamir, A. and Wagner, D.A. (1996) 'Time-lock puzzles and timed-release crypto', Tech. Rep. MIT/LCS/TR-684, Massachusetts Institute of Technology.
-
(1996)
Tech. Rep. MIT/LCS/TR-684, Massachusetts Institute of Technology
-
-
Rivest, R.L.1
Shamir, A.2
Wagner, D.A.3
-
15
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Sahai, A. and Waters, B. (2005) 'Fuzzy identity-based encryption', in Advances in Cryptology - EUROCRYPT 2005, LNCS, Vol. 3494, pp. 457-473, Springer. (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
17
-
-
0036195374
-
Personal health records on the internet: A snapshot of the pioneers at the end of the 20th Century
-
DOI 10.1016/S1386-5056(01)00215-5, PII S1386505601002155
-
Sittig, D.F. (2002) 'Personal health records on the internet: a snapshot of the pioneers at the end of the 20th century', I.J. Medical Informatics, Vol. 65, No. 1, pp. 1-6. (Pubitemid 34213787)
-
(2002)
International Journal of Medical Informatics
, vol.65
, Issue.1
, pp. 1-6
-
-
Sittig, D.F.1
-
18
-
-
84864222204
-
Public key encryption supporting plaintext equality test and user-specified authorization
-
University of Twente
-
Tang, Q. (2011a) 'Public key encryption supporting plaintext equality test and user-specified authorization', Tech. Rep. TR-CTIT-11-20, CTIT, University of Twente, available at http://eprints.eemcs.utwente.nl/20529/.
-
(2011)
Tech. Rep. TR-CTIT-11-20, CTIT
-
-
Tang, Q.1
-
19
-
-
79960259675
-
Towards public key encryption scheme supporting equality test with fine-grained authorization
-
LNCS, 6812 Springer
-
Tang, Q. (2011b) Towards public key encryption scheme supporting equality test with fine-grained authorization', in Proceedings of the 16th Australasian Conference on Information Security and Privacy, LNCS, Vol. 6812, pp. 389-406, Springer.
-
(2011)
Proceedings of the 16th Australasian Conference on Information Security and Privacy
, pp. 389-406
-
-
Tang, Q.1
-
20
-
-
78449236216
-
Public-key encryption with registered keyword search
-
LNCS, 6391 Springer
-
Tang, Q. and Chen, L. (2009) 'Public-key encryption with registered keyword search', in Proceeding of Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice (EuroPKI 2009), LNCS, Vol. 6391, pp. 163-178, Springer.
-
(2009)
Proceeding of Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice (EuroPKI 2009)
, pp. 163-178
-
-
Tang, Q.1
Chen, L.2
-
21
-
-
79951652014
-
On non-parallelizable deterministic client puzzle scheme with batch verification modes
-
University of Twente
-
Tang, Q. and Jeckmans, A. (2010) 'On non-parallelizable deterministic client puzzle scheme with batch verification modes', Tech. Rep. TR-CTIT-10-02, CTIT, University of Twente, available at http://eprints.eemcs.utwente.nl/17107/.
-
(2010)
Tech. Rep. TR-CTIT-10-02, CTIT
-
-
Tang, Q.1
Jeckmans, A.2
-
22
-
-
77952046408
-
Probabilistic public key encryption with equality test
-
Pieprzyk, J. (Ed.) LNCS, 5985 Springer
-
Yang, G., Tan, C., Huang, Q. and Wong, D.S. (2010) 'Probabilistic public key encryption with equality test', in Pieprzyk, J. (Ed.): Topics in Cryptology - CT-RSA 2010, LNCS, Vol. 5985, pp. 119-131, Springer.
-
(2010)
Topics in Cryptology - CT-RSA 2010
, pp. 119-131
-
-
Yang, G.1
Tan, C.2
Huang, Q.3
Wong, D.S.4
|