메뉴 건너뛰기




Volumn 5, Issue 12, 2012, Pages 1351-1362

Public key encryption supporting plaintext equality test and user-specified authorization

Author keywords

Authorization; Equality test; Public key encryption

Indexed keywords

COMPUTER NETWORKS; INFORMATION SYSTEMS;

EID: 84870234538     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.418     Document Type: Article
Times cited : (149)

References (25)
  • 1
    • 0036195374 scopus 로고    scopus 로고
    • Personal health records on the Internet: a snapshot of the pioneers at the end of the 20th century
    • Sittig DF. Personal health records on the Internet: a snapshot of the pioneers at the end of the 20th century. International Journal of Medical Informatics 2002; 65(1): 1-6.
    • (2002) International Journal of Medical Informatics , vol.65 , Issue.1 , pp. 1-6
    • Sittig, D.F.1
  • 2
    • 84870994444 scopus 로고    scopus 로고
    • Google Inc. Google Health.Mountain View, USA.
    • Google Inc. Google Health. http://www.google.com/intl/nl/health/about/. Mountain View, USA.
  • 3
    • 84871023270 scopus 로고    scopus 로고
    • Microsoft Corporation. Microsoft HealthVault
    • Microsoft Corporation. Microsoft HealthVault. http://www.healthvault.com/personal/index.aspx
  • 4
    • 84871001844 scopus 로고    scopus 로고
    • Cloud Security Alliance. Top threat to cloud computing V1.0. Seattle, USA.
    • Cloud Security Alliance. Top threat to cloud computing V1.0. http://www.cloudsecurityalliance.org/topthreats.html. Seattle, USA.
  • 5
    • 77952046408 scopus 로고    scopus 로고
    • Probabilistic public key encryption with equality test
    • of LNCS, Pieprzyk J (ed). Springer: Berlin
    • Yang G, Tan C, Huang Q, Wong DS. Probabilistic public key encryption with equality test. In Topics in Cryptology-CT-RSA 2010, Vol. 5985 of LNCS, Pieprzyk J (ed). Springer: Berlin, 2010; 119-131.
    • (2010) Topics in Cryptology-CT-RSA 2010 , vol.5985 , pp. 119-131
    • Yang, G.1    Tan, C.2    Huang, Q.3    Wong, D.S.4
  • 6
    • 79960259675 scopus 로고    scopus 로고
    • Towards public key encryption scheme supporting equality test with fine-grained authorization
    • of LNCS. Springer: Berlin
    • Tang Q. Towards public key encryption scheme supporting equality test with fine-grained authorization. In Proceedings of the 16th Australasian Conference on Information Security and Privacy, Vol. 6812 of LNCS. Springer: Berlin, 2011; 389-406.
    • (2011) Proceedings of the 16th Australasian Conference on Information Security and Privacy , vol.6812 , pp. 389-406
    • Tang, Q.1
  • 7
    • 84870223790 scopus 로고    scopus 로고
    • Time-lock puzzles and timed-release crypto. Technical Report MIT/LCS/TR-684, Massachusetts Institute of Technology, Cambridge, USA
    • Rivest RL, Shamir A, Wagner DA. Time-lock puzzles and timed-release crypto. Technical Report MIT/LCS/TR-684, Massachusetts Institute of Technology, Cambridge, USA, 1996.
    • (1996)
    • Rivest, R.L.1    Shamir, A.2    Wagner, D.A.3
  • 8
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • of LNCS, Krawczyk H (ed). Springer: Berlin
    • Bellare M, Desai A, Pointcheval D, Rogaway P. Relations among notions of security for public-key encryption schemes. In Advances in Cryptology-CRYPTO 1998, Vol. 1462 of LNCS, Krawczyk H (ed). Springer: Berlin, 1998; 26-45.
    • (1998) Advances in Cryptology-CRYPTO 1998 , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 9
    • 33750696320 scopus 로고    scopus 로고
    • Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
    • of LNCS, Jonker W, Petkovic M (eds). Springer: Berlin
    • Byun JW, Rhee HS, Park H, Lee DH. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Secure Data Management, Third VLDB Workshop, SDM 2006, Vol. 4165 of LNCS, Jonker W, Petkovic M (eds). Springer: Berlin, 2006; 75-83.
    • (2006) Secure Data Management, Third VLDB Workshop, SDM 2006 , vol.4165 , pp. 75-83
    • Byun, J.W.1    Rhee, H.S.2    Park, H.3    Lee, D.H.4
  • 12
    • 84871021303 scopus 로고    scopus 로고
    • Sequences of games: a tool for taming complexity in security proofs, New York, USA.
    • Shoup V. Sequences of games: a tool for taming complexity in security proofs. http://shoup.net/papers/, New York, USA, 2006.
    • (2006)
    • Shoup, V.1
  • 14
    • 84871006631 scopus 로고    scopus 로고
    • On non-parallelizable deterministic client puzzle scheme with batch verification modes. Technical Report TR-CTIT-10-02, CTIT, University of Twente,
    • Tang Q, Jeckmans A. On non-parallelizable deterministic client puzzle scheme with batch verification modes. Technical Report TR-CTIT-10-02, CTIT, University of Twente, 2010. http://eprints.eemcs.utwente.nl/17107/
    • (2010)
    • Tang, Q.1    Jeckmans, A.2
  • 15
    • 84958639277 scopus 로고    scopus 로고
    • Efficient generation of shared rsa keys (extended abstract)
    • Springer
    • Boneh D, Franklin MK. Efficient generation of shared rsa keys (extended abstract). In Advances in Cryptology-CRYPTO 1997. Springer, 1997; 425-439.
    • (1997) Advances in Cryptology-CRYPTO 1997 , pp. 425-439
    • Boneh, D.1    Franklin, M.K.2
  • 16
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • of LNCS, Cachin C, Camenisch J (eds). Springer: Berlin
    • Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In Advances in Cryptology-EUROCRYPT 2004, Vol. 3027 of LNCS, Cachin C, Camenisch J (eds). Springer: Berlin, 2004; 506-522.
    • (2004) Advances in Cryptology-EUROCRYPT 2004 , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 19
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • of LNCS, Nyberg K (ed). Springer: Berlin
    • Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography. In Advances in Cryptology-EUROCRYPT 1998, Vol. 1403 of LNCS, Nyberg K (ed). Springer: Berlin, 1998; 127-144.
    • (1998) Advances in Cryptology-EUROCRYPT 1998 , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 22
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • of LNCS, Blakley GR, Chaum D (eds). Springer
    • ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. In Advances in Cryptology-CRYPTO 1984, Vol. 196 of LNCS, Blakley GR, Chaum D (eds). Springer, 1985; 10-18.
    • (1985) Advances in Cryptology-CRYPTO 1984 , vol.196 , pp. 10-18
    • ElGamal, T.1
  • 23
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • of LNCS, Stern J (ed). Springer
    • Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology-EUROCRYPT 1999, Vol. 1592 of LNCS, Stern J (ed). Springer, 1999; 223-238.
    • (1999) Advances in Cryptology-EUROCRYPT 1999 , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 24
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Mitzenmacher M (ed). ACM Press: New York, USA
    • Gentry C. Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing, Mitzenmacher M (ed). ACM Press: New York, USA, 2009; 169-178.
    • (2009) Proceedings of the 41st Annual ACM Symposium on Theory of Computing , pp. 169-178
    • Gentry, C.1
  • 25
    • 38349070353 scopus 로고    scopus 로고
    • Generic combination of public key encryption with keyword search and public key encryption
    • of LNCS, Bao F, Ling S, Okamoto T, Wang H, Xing C (eds). Springer: Berlin
    • Zhang R, Imai H. Generic combination of public key encryption with keyword search and public key encryption. In Cryptology and Network Security, 6th International Conference, CANS 2007, Vol. 4856 of LNCS, Bao F, Ling S, Okamoto T, Wang H, Xing C (eds). Springer: Berlin, 2007; 159-174.
    • (2007) Cryptology and Network Security, 6th International Conference, CANS 2007 , vol.4856 , pp. 159-174
    • Zhang, R.1    Imai, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.