메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1-7

A novel framework for outsourcing and sharing searchable encrypted data on hybrid cloud

Author keywords

[No Author keywords available]

Indexed keywords

AUTHORIZED USERS; COMPUTATION OVERHEADS; DATA OPERATIONS; ENCRYPTED DATA; GENERIC CONSTRUCTION; KEY EXPOSURE; KEY SHARING; KEYWORD SEARCH; KEYWORD-BASED SEARCH; MESSAGE PRIVACY; OUTSOURCE; PRIVATE KEY; RAPID GROWTH; REMOTE STORAGE; SECURITY ANALYSIS; SENSITIVE DATAS;

EID: 84870704143     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/iNCoS.2012.28     Document Type: Conference Paper
Times cited : (10)

References (14)
  • 2
    • 33244488406 scopus 로고    scopus 로고
    • Secure indexes
    • An early version of this paper first appeared on the ePrint Archive, October
    • E.-J. Goh, "Secure indexes," An early version of this paper first appeared on the Cryptology ePrint Archive, October 2003.
    • (2003) Cryptology
    • Goh, E.-J.1
  • 3
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • Proceedings of the 13th ACM conference on Computer and communications security, ser. New York, NY, USA: ACM
    • R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in Proceedings of the 13th ACM conference on Computer and communications security, ser. CCS '06. New York, NY, USA: ACM, 2006, pp. 79-88.
    • (2006) CCS '06 , pp. 79-88
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 4
    • 78649836731 scopus 로고    scopus 로고
    • Computationally efficient searchable symmetric encryption
    • Secure Data Management, ser. W. Jonker and M. Petkovic, Eds. Springer Berlin / Heidelberg, [Online]. Available
    • P. Van Liesdonk, S. Sedghi, J. Doumen, P. Hartel, and W. Jonker, "Computationally efficient searchable symmetric encryption," in Secure Data Management, ser. Lecture Notes in Computer Science, W. Jonker and M. Petkovic, Eds. Springer Berlin / Heidelberg, 2010, vol. 6358, pp. 87-100. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-15546-8-7
    • (2010) Lecture Notes in Computer Science , vol.6358 , pp. 87-100
    • Van Liesdonk, P.1    Sedghi, S.2    Doumen, J.3    Hartel, P.4    Jonker, W.5
  • 5
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Advances in Cryptology - EUROCRYPT 2004, ser. C. Cachin and J. Camenisch, Eds. Springer Berlin / Heidelberg
    • D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Advances in Cryptology - EUROCRYPT 2004, ser. Lecture Notes in Computer Science, C. Cachin and J. Camenisch, Eds. Springer Berlin / Heidelberg, 2004, vol. 3027, pp. 506-522.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 6
    • 33745922362 scopus 로고    scopus 로고
    • Public key encryption with keyword search based on k-resilient ibe
    • Computational Science and Its Applications - ICCSA 2006, ser. M. Gavrilova, O. Gervasi, V. Kumar, C. Tan, D. Taniar, A. Lagan, Y. Mun, and H. Choo, Eds. Springer Berlin / Heidelberg, [Online]. Available
    • D. Khader, "Public key encryption with keyword search based on k-resilient ibe," in Computational Science and Its Applications - ICCSA 2006, ser. Lecture Notes in Computer Science, M. Gavrilova, O. Gervasi, V. Kumar, C. Tan, D. Taniar, A. Lagan, Y. Mun, and H. Choo, Eds. Springer Berlin / Heidelberg, 2006, vol. 3982, pp. 298-308. [Online]. Available: http://dx.doi.org/10.1007/11751595-33
    • (2006) Lecture Notes in Computer Science , vol.3982 , pp. 298-308
    • Khader, D.1
  • 7
    • 38349025630 scopus 로고    scopus 로고
    • Public key encryption with searchable keywords based on jacobi symbols
    • Progress in Cryptology INDOCRYPT 2007, ser. K. Srinathan, C. Rangan, and M. Yung, Eds. Springer Berlin / Heidelberg, [Online]. Available
    • G. Di Crescenzo and V. Saraswat, "Public key encryption with searchable keywords based on jacobi symbols," in Progress in Cryptology INDOCRYPT 2007, ser. Lecture Notes in Computer Science, K. Srinathan, C. Rangan, and M. Yung, Eds. Springer Berlin / Heidelberg, 2007, vol. 4859, pp. 282-296. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-77026-8-21
    • (2007) Lecture Notes in Computer Science , vol.4859 , pp. 282-296
    • Di Crescenzo, G.1    Saraswat, V.2
  • 8
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Pairing-Based Cryptography Pairing 2007, ser. T. Takagi, T. Okamoto, E. Okamoto, and T. Okamoto, Eds. Springer Berlin / Heidelberg, [Online]. Available
    • Y. Hwang and P. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," in Pairing-Based Cryptography Pairing 2007, ser. Lecture Notes in Computer Science, T. Takagi, T. Okamoto, E. Okamoto, and T. Okamoto, Eds. Springer Berlin / Heidelberg, 2007, vol. 4575, pp. 2-22. [Online]. Available: http://dx.doi.org/10.1007/978-3-540- 73489-5-2
    • (2007) Lecture Notes in Computer Science , vol.4575 , pp. 2-22
    • Hwang, Y.1    Lee, P.2
  • 9
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • Theory of Cryptography, ser. S. Vadhan, Ed., Springer Berlin / Heidelberg, [Online]. Available
    • D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Theory of Cryptography, ser. Lecture Notes in Computer Science, S. Vadhan, Ed., vol. 4392. Springer Berlin / Heidelberg, 2007, pp. 535-554. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-70936-7-29
    • (2007) Lecture Notes in Computer Science , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 12
    • 79959265831 scopus 로고    scopus 로고
    • Shared and searchable encrypted data for untrusted servers
    • May
    • C. Dong, G. Russello, and N. Dulay, "Shared and searchable encrypted data for untrusted servers," Journal of Computer Security, vol. 19, no. 3, pp. 367-397, May 2011.
    • (2011) Journal of Computer Security , vol.19 , Issue.3 , pp. 367-397
    • Dong, C.1    Russello, G.2    Dulay, N.3
  • 13
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • R. Cramer and V. Shoup, "Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack," SIAM Journal on Computing, vol. 33, no. 1, pp. 167-226, 2003.
    • (2003) SIAM Journal on Computing , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 14
    • 38149117029 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • Advances in Cryptology ASIACRYPT 2007, ser. K. Kurosawa, Ed. Springer Berlin / Heidelberg, [Online]. Available
    • C. Delerable, "Identity-based broadcast encryption with constant size ciphertexts and private keys," in Advances in Cryptology ASIACRYPT 2007, ser. Lecture Notes in Computer Science, K. Kurosawa, Ed. Springer Berlin / Heidelberg, 2007, vol. 4833, pp. 200-215. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-76900-2-12
    • (2007) Lecture Notes in Computer Science , vol.4833 , pp. 200-215
    • Delerable, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.