-
1
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi Searchable encryption revisited: consistency properties, relation to anonymous IBE and extensions Proc. of The 25th Annual International Cryptology Conference Advances in Cryptology-CRYPTO 2005, LNCS 3621 2005 Springer-Verlag 205 222 (Pubitemid 43902115)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
3
-
-
33750246968
-
On the integration of public key data encryption and public key encryption with keyword search
-
Information Security - 9th International Conference, ISC 2006, Proceedings
-
J. Baek, R. Safavi-Naini, and W. Susilo On the integration of public key data encryption and public key encryption with keyword search Proc. of 9th Information Security Conference, ISC 2006 LNCS 4176 2006 Springer-Verlag 217 232 (Pubitemid 44609949)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4176
, pp. 217-232
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
4
-
-
35048901123
-
Public key encryption with keyword search
-
LNCS Springer-Verlag
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano Public key encryption with keyword search Proc. of International Conference on the Theory and Applications of Cryptographic Techniques, Advances in Cryptology-EUROCRYPT 2004 LNCS 3027 2004 Springer-Verlag 506 522
-
(2004)
Proc. of International Conference on the Theory and Applications of Cryptographic Techniques, Advances in Cryptology-EUROCRYPT 2004
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
5
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
LNCS Springer-Verlag
-
D. Boneh, and B. Waters Conjunctive, subset, and range queries on encrypted data Proc. of Fourth IACR Theory of Cryptography Conference, TCC 2007 LNCS 4392 2007 Springer-Verlag 535 554
-
(2007)
Proc. of Fourth IACR Theory of Cryptography Conference, TCC 2007
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
6
-
-
33750696320
-
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
-
Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings
-
J.W. Byun, H.S. Rhee, H.A. Park, and D.H. Lee Off-line keyword guessing attacks on recent keyword search schemes over encrypted data Proc. of 3rd VLDB Workshop on Secure Data Management, SDM 2006 LNCS 4165 2006 Springer-Verlag 75 83 (Pubitemid 44699624)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4165
, pp. 75-83
-
-
Byun, J.W.1
Rhee, H.S.2
Park, H.-A.3
Lee, D.H.4
-
7
-
-
0031619016
-
The random oracle methodology, revisited
-
ACM Press
-
R. Canetti, O. Goldreich, and S. Halevi The random oracle methodology, revisited Proc. of the Thirtieth Annual ACM Symposium on the Theory of Computing, STOC 1998 1998 ACM Press 209 218
-
(1998)
Proc. of the Thirtieth Annual ACM Symposium on the Theory of Computing, STOC 1998
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
8
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
LNCS Springer Heidelberg
-
R. Canetti, S. Halevi, and J. Katz Chosen-ciphertext security from identity-based encryption EUROCRYPT 2004 LNCS 3027 2004 Springer Heidelberg 202 222
-
(2004)
EUROCRYPT 2004
, vol.3027
, pp. 202-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
9
-
-
79960702552
-
Longitude: A privacy-preserving location sharing protocol for mobile applications
-
C. Dong, N. Dulay, Longitude: a privacy-preserving location sharing protocol for mobile applications, in: Proc. of IFIPTM 2011. IFIP AICT 358, 2011, pp. 133-148.
-
(2011)
Proc. of IFIPTM 2011. IFIP AICT 358
, pp. 133-148
-
-
Dong, C.1
Dulay, N.2
-
10
-
-
71549153479
-
A secure channel free public key encryption with keyword search scheme without random oracle
-
LNCS 5888, Springer, Heidelberg
-
L. Fang, W. Susilo, C. Ge, J. Wang, A secure channel free public key encryption with keyword search scheme without random oracle, in: Proc. of Cryptology and Network Security, 8th International Conference, CANS 2009, LNCS 5888, Springer, Heidelberg, 2009, pp. 248-258.
-
(2009)
Proc. of Cryptology and Network Security, 8th International Conference, CANS 2009
, pp. 248-258
-
-
Fang, L.1
Susilo, W.2
Ge, C.3
Wang, J.4
-
11
-
-
38049035823
-
Efficient pseudorandom generators based on the DDH assumption
-
LNCS Springer Heidelberg
-
R.R. Farashahi, B. Schoenmakers, and A. Sidorenko Efficient pseudorandom generators based on the DDH assumption Proc. of PKC 2007 LNCS 4450 2007 Springer Heidelberg 426 441
-
(2007)
Proc. of PKC 2007
, vol.4450
, pp. 426-441
-
-
Farashahi, R.R.1
Schoenmakers, B.2
Sidorenko, A.3
-
15
-
-
33745120364
-
Secure conjunctive search over encrypted data
-
M. Jakobsson, M. Yung, J. Zhou, LNCS Springer-Verlag
-
P. Golle, J. Staddon, and B. Waters Secure conjunctive search over encrypted data M. Jakobsson, M. Yung, J. Zhou, Proc. of Second International Conference on Applied Cryptography and Network Security, ACNS 2004 LNCS 3089 2004 Springer-Verlag 31 45
-
(2004)
Proc. of Second International Conference on Applied Cryptography and Network Security, ACNS 2004
, vol.3089
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
20
-
-
58249100325
-
Constructing PEKS schemes secure against keyword guessing attacks is possible?
-
I.R. Jeong, J.O. Kwon, D. Hong, and D.H. Lee Constructing PEKS schemes secure against keyword guessing attacks is possible? Computer Communications Express 32 2 2009 394 396
-
(2009)
Computer Communications Express
, vol.32
, Issue.2
, pp. 394-396
-
-
Jeong, I.R.1
Kwon, J.O.2
Hong, D.3
Lee, D.H.4
-
21
-
-
33746324862
-
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
-
DOI 10.1007/11780656-28, Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings
-
E. Kiltz, D. Galindo, Direct chosen-ciphertext secure identity-based key encapsulation without random oracles, in: Proc. of Information Security and Privacy, 11th Australasian Conference, ACISP 2006, LNCS 4058, Springer-Verlag, 2006, pp. 336-347. (Pubitemid 44113021)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4058
, pp. 336-347
-
-
Kiltz, E.1
Galindo, D.2
-
22
-
-
79951515923
-
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
-
E. Kiltz, and D. Galindo Direct chosen-ciphertext secure identity-based key encapsulation without random oracles Theoretical Computer Science Elsevier 410 47-49 2009 5093 5111
-
(2009)
Theoretical Computer Science Elsevier
, vol.410
, Issue.4749
, pp. 5093-5111
-
-
Kiltz, E.1
Galindo, D.2
-
24
-
-
59049098563
-
How intractable is the discrete logarithm for a general finite group?
-
Lecture Notes in Computer Science Springer-Verlag Berlin
-
T. Okamoto, K. Sakurai, and H. Shizuya How intractable is the discrete logarithm for a general finite group? Proc. Eurocrypt 1992 Lecture Notes in Computer Science 658 1992 Springer-Verlag Berlin 420 428
-
(1992)
Proc. Eurocrypt 1992
, vol.658
, pp. 420-428
-
-
Okamoto, T.1
Sakurai, K.2
Shizuya, H.3
-
25
-
-
23944469009
-
Public key encryption with conjunctive field keyword search
-
Information Security Applications - 5th International Workshop, WISA 2004
-
D.J. Park, K. Kim, and P.J. Lee Public key encryption with conjunctive field keyword search C.H. Lim, M. Yung, Proc. of Information Security Applications, 5th International Workshop, WISA 2004 LNCS 3325 2005 Springer-Verlag 73 86 (Pubitemid 41190803)
-
(2005)
Lecture Notes in Computer Science
, vol.3325
, pp. 73-86
-
-
Park, D.J.1
Kim, K.2
Lee, P.J.3
-
26
-
-
77952354675
-
A block cipher based pseudo random number generator secure against side-channel key recovery
-
ACM New York, NY
-
C. Petit, F. Standaert, O. Pereira, T.G. Malkin, and M. Yung A block cipher based pseudo random number generator secure against side-channel key recovery Proc. of the 3th international Symposium on information, Computer, and Communications Security, ASIACCS 2008 2008 ACM New York, NY 56 65
-
(2008)
Proc. of the 3th International Symposium on Information, Computer, and Communications Security, ASIACCS 2008
, pp. 56-65
-
-
Petit, C.1
Standaert, F.2
Pereira, O.3
Malkin, T.G.4
Yung, M.5
-
27
-
-
71549160150
-
Improved searchable public key encryption with designated tester
-
ACM New York, NY
-
H.S. Rhee, J.H. Park, W. Susilo, and D.H. Lee Improved searchable public key encryption with designated tester Proc. of the 4th international Symposium on information, Computer, and Communications Security, ASIACCS 2009 2009 ACM New York, NY 376 379
-
(2009)
Proc. of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS 2009
, pp. 376-379
-
-
Rhee, H.S.1
Park, J.H.2
Susilo, W.3
Lee, D.H.4
-
28
-
-
84861580700
-
Generic construction of designated tester public-key encryption with keyword search
-
H.S. Rhee, J.H. Park, and D.H. Lee Generic construction of designated tester public-key encryption with keyword search Information Sciences. Express 205 1 2012 93 109
-
(2012)
Information Sciences. Express
, vol.205
, Issue.1
, pp. 93-109
-
-
Rhee, H.S.1
Park, J.H.2
Lee, D.H.3
-
29
-
-
64949106593
-
Secure searchable public key encryption scheme against keyword guessing attacks
-
H.S. Rhee, W. Susilo, and H-J. Kim Secure searchable public key encryption scheme against keyword guessing attacks IEICE Electron. Express 6 5 2009 237 243
-
(2009)
IEICE Electron. Express
, vol.6
, Issue.5
, pp. 237-243
-
-
Rhee, H.S.1
Susilo, W.2
Kim, H.-J.3
-
30
-
-
77649179760
-
Trapdoor security in a searchable public-key encryption scheme with a designated tester
-
H.S. Rhee, J.H. Park, W. Susilo, and D.H. Lee Trapdoor security in a searchable public-key encryption scheme with a designated tester Journal of Systems and Software, Express 83 5 2010 763 771
-
(2010)
Journal of Systems and Software, Express
, vol.83
, Issue.5
, pp. 763-771
-
-
Rhee, H.S.1
Park, J.H.2
Susilo, W.3
Lee, D.H.4
-
31
-
-
77950864045
-
Proxy re-encryption with keyword search
-
J. Shao, Z. Cao, X. Liang, and H. Lin Proxy re-encryption with keyword search Information Sciences. Express 180 13 2010 2576 2587
-
(2010)
Information Sciences. Express
, vol.180
, Issue.13
, pp. 2576-2587
-
-
Shao, J.1
Cao, Z.2
Liang, X.3
Lin, H.4
-
33
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
B. Waters Efficient identity-based encryption without random oracles Proc. of 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Advances in Cryptology-EUROCRYPT 2005 LNCS 3494 2005 Springer-Verlag 114 127 (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
34
-
-
77952589508
-
Building an encrypted and searchable audit log
-
B. Waters, D. Balfanz, G. Durfee, D. Smetters, Building an encrypted and searchable audit log, in: Proc. of Network and Distributed System Security Symposium, NDSS 2004, 2004.
-
(2004)
Proc. of Network and Distributed System Security Symposium, NDSS 2004
-
-
Waters, B.1
Balfanz, D.2
Durfee, G.3
Smetters, D.4
-
36
-
-
78649325305
-
An efficient public key encryption with conjunctive-subset keywords search
-
B. Zhang, and F. Zhang An efficient public key encryption with conjunctive-subset keywords search Journal of Network and Computer Applications. Express 34 1 2011 262 267
-
(2011)
Journal of Network and Computer Applications. Express
, vol.34
, Issue.1
, pp. 262-267
-
-
Zhang, B.1
Zhang, F.2
|