메뉴 건너뛰기




Volumn , Issue , 2012, Pages 917-922

Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers

Author keywords

[No Author keywords available]

Indexed keywords

DATA USABILITY; DESIGN GOAL; ENCRYPTION SCHEMES; END USERS; SEARCH OPERATIONS; SEARCHABILITY; SECURITY ANALYSIS; SERVICE AVAILABILITY;

EID: 84871978542     PISSN: 15503607     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2012.6364125     Document Type: Conference Paper
Times cited : (248)

References (11)
  • 1
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • Advances in Cryptology, CRYPTO'07
    • M. Bellare, A. Boldyreva, and A. ONeill, Deterministic and efficiently searchable encryption, Advances in Cryptology, CRYPTO'07, LNCS 4622, pp. 535-552, 2007.
    • (2007) LNCS , vol.4622 , pp. 535-552
    • Bellare, M.1    Boldyreva, A.2    Oneill, A.3
  • 2
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Advances in Cryptology, EUROCRYPT'04
    • D. Boneh, G. Crescenzo, R. Ostrovsky and G. Persiano, Public key encryption with keyword search, Advances in Cryptology, EUROCRYPT'04, LNCS 3027, pp. 506-522, 2004.
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 3
    • 51849127804 scopus 로고    scopus 로고
    • Derministic encryption: Definitional equivalences and constructions without random oracles
    • Advances in Cryptology, CRYPTO'08
    • M. Bellare, M. Fischlin, A. O'Neill and T. Ristenpart, Derministic encryption: definitional equivalences and constructions without random oracles, Advances in Cryptology, CRYPTO'08, LNCS 5157, pp. 360-378, 2008.
    • (2008) LNCS , vol.5157 , pp. 360-378
    • Bellare, M.1    Fischlin, M.2    O'neill, A.3    Ristenpart, T.4
  • 4
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • Theory of Cryptography, TCC'07
    • D. Boneh and B.Waters, Conjunctive, subset, and range queries on encrypted data, Theory of Cryptography, TCC'07, LNCS 4392, pp. 535-554, 2007.
    • (2007) LNCS , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 6
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Applied Cryptography And Network Security, ACNS'05
    • Y. Chang and M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, Applied Cryptography And Network Security, ACNS'05, LNCS 3531, pp. 391-421, 2005.
    • (2005) LNCS , vol.3531 , pp. 391-421
    • Chang, Y.1    Mitzenmacher, M.2
  • 7
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky, Software protection and simulation on oblivious RAMs, Journal of the ACM, vol.43, no. 3, pp. 431-473, 1996.
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.