-
1
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in IEEE Symposium on Security and Privacy, 2000, pp. 44-55.
-
IEEE Symposium on Security and Privacy, 2000
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
2
-
-
33244488406
-
Secure indexes
-
An early version of this paper first appeared on the ePrint Archive, October
-
E.-J. Goh, "Secure indexes," An early version of this paper first appeared on the Cryptology ePrint Archive, October 2003.
-
(2003)
Cryptology
-
-
Goh, E.-J.1
-
3
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Proceedings of the 13th ACM conference on Computer and communications security, ser. New York, NY, USA: ACM
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in Proceedings of the 13th ACM conference on Computer and communications security, ser. CCS '06. New York, NY, USA: ACM, 2006, pp. 79-88.
-
(2006)
CCS '06
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
4
-
-
78649836731
-
Computationally efficient searchable symmetric encryption
-
Secure Data Management, ser. W. Jonker and M. Petkovic, Eds. Springer Berlin / Heidelberg, [Online]. Available
-
P. Van Liesdonk, S. Sedghi, J. Doumen, P. Hartel, and W. Jonker, "Computationally efficient searchable symmetric encryption," in Secure Data Management, ser. Lecture Notes in Computer Science, W. Jonker and M. Petkovic, Eds. Springer Berlin / Heidelberg, 2010, vol. 6358, pp. 87-100. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-15546-8-7
-
(2010)
Lecture Notes in Computer Science
, vol.6358
, pp. 87-100
-
-
Van Liesdonk, P.1
Sedghi, S.2
Doumen, J.3
Hartel, P.4
Jonker, W.5
-
5
-
-
35048901123
-
Public key encryption with keyword search
-
Advances in Cryptology - EUROCRYPT 2004, ser. C. Cachin and J. Camenisch, Eds. Springer Berlin / Heidelberg
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Advances in Cryptology - EUROCRYPT 2004, ser. Lecture Notes in Computer Science, C. Cachin and J. Camenisch, Eds. Springer Berlin / Heidelberg, 2004, vol. 3027, pp. 506-522.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
33745922362
-
Public key encryption with keyword search based on k-resilient ibe
-
Computational Science and Its Applications - ICCSA 2006, ser. M. Gavrilova, O. Gervasi, V. Kumar, C. Tan, D. Taniar, A. Lagan, Y. Mun, and H. Choo, Eds. Springer Berlin / Heidelberg, [Online]. Available
-
D. Khader, "Public key encryption with keyword search based on k-resilient ibe," in Computational Science and Its Applications - ICCSA 2006, ser. Lecture Notes in Computer Science, M. Gavrilova, O. Gervasi, V. Kumar, C. Tan, D. Taniar, A. Lagan, Y. Mun, and H. Choo, Eds. Springer Berlin / Heidelberg, 2006, vol. 3982, pp. 298-308. [Online]. Available: http://dx.doi.org/10.1007/11751595-33
-
(2006)
Lecture Notes in Computer Science
, vol.3982
, pp. 298-308
-
-
Khader, D.1
-
7
-
-
38349025630
-
Public key encryption with searchable keywords based on jacobi symbols
-
Progress in Cryptology INDOCRYPT 2007, ser. K. Srinathan, C. Rangan, and M. Yung, Eds. Springer Berlin / Heidelberg, [Online]. Available
-
G. Di Crescenzo and V. Saraswat, "Public key encryption with searchable keywords based on jacobi symbols," in Progress in Cryptology INDOCRYPT 2007, ser. Lecture Notes in Computer Science, K. Srinathan, C. Rangan, and M. Yung, Eds. Springer Berlin / Heidelberg, 2007, vol. 4859, pp. 282-296. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-77026-8-21
-
(2007)
Lecture Notes in Computer Science
, vol.4859
, pp. 282-296
-
-
Di Crescenzo, G.1
Saraswat, V.2
-
8
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Pairing-Based Cryptography Pairing 2007, ser. T. Takagi, T. Okamoto, E. Okamoto, and T. Okamoto, Eds. Springer Berlin / Heidelberg, [Online]. Available
-
Y. Hwang and P. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," in Pairing-Based Cryptography Pairing 2007, ser. Lecture Notes in Computer Science, T. Takagi, T. Okamoto, E. Okamoto, and T. Okamoto, Eds. Springer Berlin / Heidelberg, 2007, vol. 4575, pp. 2-22. [Online]. Available: http://dx.doi.org/10.1007/978-3-540- 73489-5-2
-
(2007)
Lecture Notes in Computer Science
, vol.4575
, pp. 2-22
-
-
Hwang, Y.1
Lee, P.2
-
9
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Theory of Cryptography, ser. S. Vadhan, Ed., Springer Berlin / Heidelberg, [Online]. Available
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Theory of Cryptography, ser. Lecture Notes in Computer Science, S. Vadhan, Ed., vol. 4392. Springer Berlin / Heidelberg, 2007, pp. 535-554. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-70936-7-29
-
(2007)
Lecture Notes in Computer Science
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
10
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
march
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," in INFOCOM, 2010 Proceedings IEEE, march 2010, pp. 1 -5.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
11
-
-
80051880293
-
Authorized private keyword search over encrypted data in cloud computing
-
june
-
M. Li, S. Yu, N. Cao, and W. Lou, "Authorized private keyword search over encrypted data in cloud computing," in Distributed Computing Systems (ICDCS), 2011 31st International Conference, june 2011, pp. 383-392.
-
(2011)
Distributed Computing Systems (ICDCS), 2011 31st International Conference
, pp. 383-392
-
-
Li, M.1
Yu, S.2
Cao, N.3
Lou, W.4
-
12
-
-
79959265831
-
Shared and searchable encrypted data for untrusted servers
-
May
-
C. Dong, G. Russello, and N. Dulay, "Shared and searchable encrypted data for untrusted servers," Journal of Computer Security, vol. 19, no. 3, pp. 367-397, May 2011.
-
(2011)
Journal of Computer Security
, vol.19
, Issue.3
, pp. 367-397
-
-
Dong, C.1
Russello, G.2
Dulay, N.3
-
13
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
R. Cramer and V. Shoup, "Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack," SIAM Journal on Computing, vol. 33, no. 1, pp. 167-226, 2003.
-
(2003)
SIAM Journal on Computing
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
14
-
-
38149117029
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
Advances in Cryptology ASIACRYPT 2007, ser. K. Kurosawa, Ed. Springer Berlin / Heidelberg, [Online]. Available
-
C. Delerable, "Identity-based broadcast encryption with constant size ciphertexts and private keys," in Advances in Cryptology ASIACRYPT 2007, ser. Lecture Notes in Computer Science, K. Kurosawa, Ed. Springer Berlin / Heidelberg, 2007, vol. 4833, pp. 200-215. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-76900-2-12
-
(2007)
Lecture Notes in Computer Science
, vol.4833
, pp. 200-215
-
-
Delerable, C.1
|