메뉴 건너뛰기




Volumn 238, Issue , 2013, Pages 221-241

Public key encryption with keyword search secure against keyword guessing attacks without random oracle

Author keywords

Keyword guessing attack; Public key encryption with keyword search; Without random oracle

Indexed keywords

CHOSEN CIPHERTEXT ATTACK; GUESSING ATTACKS; PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH (PEKS); PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCHES; RANDOM ORACLE MODEL; SECURITY NOTION; UNTRUSTED SERVER; WITHOUT RANDOM ORACLES;

EID: 84876842378     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2013.03.008     Document Type: Article
Times cited : (209)

References (37)
  • 8
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • LNCS Springer Heidelberg
    • R. Canetti, S. Halevi, and J. Katz Chosen-ciphertext security from identity-based encryption EUROCRYPT 2004 LNCS 3027 2004 Springer Heidelberg 202 222
    • (2004) EUROCRYPT 2004 , vol.3027 , pp. 202-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 9
    • 79960702552 scopus 로고    scopus 로고
    • Longitude: A privacy-preserving location sharing protocol for mobile applications
    • C. Dong, N. Dulay, Longitude: a privacy-preserving location sharing protocol for mobile applications, in: Proc. of IFIPTM 2011. IFIP AICT 358, 2011, pp. 133-148.
    • (2011) Proc. of IFIPTM 2011. IFIP AICT 358 , pp. 133-148
    • Dong, C.1    Dulay, N.2
  • 11
    • 38049035823 scopus 로고    scopus 로고
    • Efficient pseudorandom generators based on the DDH assumption
    • LNCS Springer Heidelberg
    • R.R. Farashahi, B. Schoenmakers, and A. Sidorenko Efficient pseudorandom generators based on the DDH assumption Proc. of PKC 2007 LNCS 4450 2007 Springer Heidelberg 426 441
    • (2007) Proc. of PKC 2007 , vol.4450 , pp. 426-441
    • Farashahi, R.R.1    Schoenmakers, B.2    Sidorenko, A.3
  • 20
    • 58249100325 scopus 로고    scopus 로고
    • Constructing PEKS schemes secure against keyword guessing attacks is possible?
    • I.R. Jeong, J.O. Kwon, D. Hong, and D.H. Lee Constructing PEKS schemes secure against keyword guessing attacks is possible? Computer Communications Express 32 2 2009 394 396
    • (2009) Computer Communications Express , vol.32 , Issue.2 , pp. 394-396
    • Jeong, I.R.1    Kwon, J.O.2    Hong, D.3    Lee, D.H.4
  • 22
    • 79951515923 scopus 로고    scopus 로고
    • Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
    • E. Kiltz, and D. Galindo Direct chosen-ciphertext secure identity-based key encapsulation without random oracles Theoretical Computer Science Elsevier 410 47-49 2009 5093 5111
    • (2009) Theoretical Computer Science Elsevier , vol.410 , Issue.4749 , pp. 5093-5111
    • Kiltz, E.1    Galindo, D.2
  • 24
    • 59049098563 scopus 로고
    • How intractable is the discrete logarithm for a general finite group?
    • Lecture Notes in Computer Science Springer-Verlag Berlin
    • T. Okamoto, K. Sakurai, and H. Shizuya How intractable is the discrete logarithm for a general finite group? Proc. Eurocrypt 1992 Lecture Notes in Computer Science 658 1992 Springer-Verlag Berlin 420 428
    • (1992) Proc. Eurocrypt 1992 , vol.658 , pp. 420-428
    • Okamoto, T.1    Sakurai, K.2    Shizuya, H.3
  • 25
    • 23944469009 scopus 로고    scopus 로고
    • Public key encryption with conjunctive field keyword search
    • Information Security Applications - 5th International Workshop, WISA 2004
    • D.J. Park, K. Kim, and P.J. Lee Public key encryption with conjunctive field keyword search C.H. Lim, M. Yung, Proc. of Information Security Applications, 5th International Workshop, WISA 2004 LNCS 3325 2005 Springer-Verlag 73 86 (Pubitemid 41190803)
    • (2005) Lecture Notes in Computer Science , vol.3325 , pp. 73-86
    • Park, D.J.1    Kim, K.2    Lee, P.J.3
  • 28
    • 84861580700 scopus 로고    scopus 로고
    • Generic construction of designated tester public-key encryption with keyword search
    • H.S. Rhee, J.H. Park, and D.H. Lee Generic construction of designated tester public-key encryption with keyword search Information Sciences. Express 205 1 2012 93 109
    • (2012) Information Sciences. Express , vol.205 , Issue.1 , pp. 93-109
    • Rhee, H.S.1    Park, J.H.2    Lee, D.H.3
  • 29
    • 64949106593 scopus 로고    scopus 로고
    • Secure searchable public key encryption scheme against keyword guessing attacks
    • H.S. Rhee, W. Susilo, and H-J. Kim Secure searchable public key encryption scheme against keyword guessing attacks IEICE Electron. Express 6 5 2009 237 243
    • (2009) IEICE Electron. Express , vol.6 , Issue.5 , pp. 237-243
    • Rhee, H.S.1    Susilo, W.2    Kim, H.-J.3
  • 30
    • 77649179760 scopus 로고    scopus 로고
    • Trapdoor security in a searchable public-key encryption scheme with a designated tester
    • H.S. Rhee, J.H. Park, W. Susilo, and D.H. Lee Trapdoor security in a searchable public-key encryption scheme with a designated tester Journal of Systems and Software, Express 83 5 2010 763 771
    • (2010) Journal of Systems and Software, Express , vol.83 , Issue.5 , pp. 763-771
    • Rhee, H.S.1    Park, J.H.2    Susilo, W.3    Lee, D.H.4
  • 33
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption without random oracles
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • B. Waters Efficient identity-based encryption without random oracles Proc. of 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Advances in Cryptology-EUROCRYPT 2005 LNCS 3494 2005 Springer-Verlag 114 127 (Pubitemid 41313949)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 114-127
    • Waters, B.1
  • 36
    • 78649325305 scopus 로고    scopus 로고
    • An efficient public key encryption with conjunctive-subset keywords search
    • B. Zhang, and F. Zhang An efficient public key encryption with conjunctive-subset keywords search Journal of Network and Computer Applications. Express 34 1 2011 262 267
    • (2011) Journal of Network and Computer Applications. Express , vol.34 , Issue.1 , pp. 262-267
    • Zhang, B.1    Zhang, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.