-
1
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In CRYPTO, pages 205-222, 2005.
-
(2005)
CRYPTO
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
33750246968
-
On the integration of public key data encryption and public key encryption with keyword search
-
J. Baek, R. Safavi-Naini, and W. Susilo. On the integration of public key data encryption and public key encryption with keyword search. In ISC, pages 217-232, 2006.
-
(2006)
ISC
, pp. 217-232
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
3
-
-
54249101916
-
Public key encryption with keyword search revisited
-
J. Baek, R. Safavi-Naini, and W. Susilo. Public key encryption with keyword search revisited. In ICCSA (1), pages 1249-1259, 2008.
-
(2008)
ICCSA (1)
, pp. 1249-1259
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
5
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
M. Bellare, A. Boldyreva, and A. O'Neill. Deterministic and efficiently searchable encryption. In CRYPTO, pages 535-552, 2007.
-
(2007)
CRYPTO
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
6
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
7
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In EUROCRYPT, pages 506-522, 2004.
-
(2004)
EUROCRYPT
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
8
-
-
24144433396
-
Evaluating 2-dnf formulas on ciphertexts
-
D. Boneh, E.-J. Goh, and K. Nissim. Evaluating 2-dnf formulas on ciphertexts. In TCC, pages 325-341, 2005.
-
(2005)
TCC
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
9
-
-
38049138213
-
Public key encryption that allows pir queries
-
D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. E. S. III. Public key encryption that allows pir queries. In CRYPTO, pages 50-67, 2007.
-
(2007)
CRYPTO
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
S III, W.E.4
-
10
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In TCC, pages 535-554, 2007.
-
(2007)
TCC
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
11
-
-
70449490810
-
Error-tolerant searchable encryption
-
J. Bringer, H. Chabanne, and B. Kindarji. Error-tolerant searchable encryption. In ICC, pages 1-6, 2009.
-
(2009)
ICC
, pp. 1-6
-
-
Bringer, J.1
Chabanne, H.2
Kindarji, B.3
-
12
-
-
33750696320
-
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
-
J. W. Byun, H. S. Rhee, H.-A. Park, and D. H. Lee. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Secure Data Management, pages 75-83, 2006.
-
(2006)
Secure Data Management
, pp. 75-83
-
-
Byun, J.W.1
Rhee, H.S.2
Park, H.-A.3
Lee, D.H.4
-
13
-
-
38349025630
-
Public key encryption with searchable keywords based on jacobi symbols
-
G. D. Crescenzo and V. Saraswat. Public key encryption with searchable keywords based on jacobi symbols. In INDOCRYPT, pages 282-296, 2007.
-
(2007)
INDOCRYPT
, pp. 282-296
-
-
Crescenzo, G.D.1
Saraswat, V.2
-
14
-
-
71549153479
-
A secure channel free public key encryption with keyword search scheme without random oracle
-
L. Fang, W. Susilo, C. Ge, and J. Wang. A secure channel free public key encryption with keyword search scheme without random oracle. In CANS, pages 248-258, 2009.
-
(2009)
CANS
, pp. 248-258
-
-
Fang, L.1
Susilo, W.2
Ge, C.3
Wang, J.4
-
15
-
-
38149055585
-
Decryptable searchable encryption
-
T. Fuhr and P. Paillier. Decryptable searchable encryption. In ProvSec, pages 228-236, 2007.
-
(2007)
ProvSec
, pp. 228-236
-
-
Fuhr, T.1
Paillier, P.2
-
16
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, and B. R. Waters. Secure conjunctive keyword search over encrypted data. In ACNS, pages 31-45, 2004.
-
(2004)
ACNS
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.R.3
-
17
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In ACM Conference on Computer and Communications Security, pages 89-98, 2006.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
18
-
-
54249087643
-
Efficient public key encryption with keyword search schemes from pairings
-
C. Gu, Y. Zhu, and H. Pan. Efficient public key encryption with keyword search schemes from pairings. In Inscrypt, pages 372-383, 2007.
-
(2007)
Inscrypt
, pp. 372-383
-
-
Gu, C.1
Zhu, Y.2
Pan, H.3
-
19
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Y. H. Hwang and P. J. Lee. Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Pairing, pages 2-22, 2007.
-
(2007)
Pairing
, pp. 2-22
-
-
Hwang, Y.H.1
Lee, P.J.2
-
20
-
-
44449142730
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. IACR Cryptology ePrint Archive, 2007:404, 2007.
-
(2007)
IACR Cryptology EPrint Archive
, vol.2007
, pp. 404
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
21
-
-
33745922362
-
Public key encryption with keyword search based on k-resilient ibe
-
D. Khader. Public key encryption with keyword search based on k-resilient ibe. In ICCSA (3), pages 298-308, 2006.
-
(2006)
ICCSA (3)
, pp. 298-308
-
-
Khader, D.1
-
22
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In EUROCRYPT, pages 62-91, 2010.
-
(2010)
EUROCRYPT
, pp. 62-91
-
-
Lewko, A.B.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
23
-
-
77949581448
-
New techniques for dual system encryption and fully secure hibe with short ciphertexts
-
A. B. Lewko and B. Waters. New techniques for dual system encryption and fully secure hibe with short ciphertexts. In TCC, pages 455-479, 2010.
-
(2010)
TCC
, pp. 455-479
-
-
Lewko, A.B.1
Waters, B.2
-
24
-
-
79957993008
-
Decentralizing attribute-based encryption
-
A. B. Lewko and B. Waters. Decentralizing attribute-based encryption. In EUROCRYPT, pages 568-588, 2011.
-
(2011)
EUROCRYPT
, pp. 568-588
-
-
Lewko, A.B.1
Waters, B.2
-
25
-
-
84865479255
-
New proof methods for attribute-based encryption: Achieving full security through selective techniques
-
A. B. Lewko and B. Waters. New proof methods for attribute-based encryption: Achieving full security through selective techniques. In CRYPTO, pages 180-198, 2012.
-
(2012)
CRYPTO
, pp. 180-198
-
-
Lewko, A.B.1
Waters, B.2
-
26
-
-
23944469009
-
Public key encryption with conjunctive field keyword search
-
D. J. Park, K. Kim, and P. J. Lee. Public key encryption with conjunctive field keyword search. In WISA, pages 73-86, 2004.
-
(2004)
WISA
, pp. 73-86
-
-
Park, D.J.1
Kim, K.2
Lee, P.J.3
-
27
-
-
71549160150
-
Improved searchable public key encryption with designated tester
-
H. S. Rhee, J. H. Park, W. Susilo, and D. H. Lee. Improved searchable public key encryption with designated tester. In ASIACCS, pages 376-379, 2009.
-
(2009)
ASIACCS
, pp. 376-379
-
-
Rhee, H.S.1
Park, J.H.2
Susilo, W.3
Lee, D.H.4
-
28
-
-
77649179760
-
Trapdoor security in a searchable public-key encryption scheme with a designated tester
-
H. S. Rhee, J. H. Park, W. Susilo, and D. H. Lee. Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software, 83(5):763-771, 2010.
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.5
, pp. 763-771
-
-
Rhee, H.S.1
Park, J.H.2
Susilo, W.3
Lee, D.H.4
-
29
-
-
64949106593
-
Secure searchable public key encryption scheme against keyword guessing attacks
-
H. S. Rhee, W. Susilo, and H.-J. Kim. Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electronics Express, 6(5):237-243, 2009.
-
(2009)
IEICE Electronics Express
, vol.6
, Issue.5
, pp. 237-243
-
-
Rhee, H.S.1
Susilo, W.2
Kim, H.-J.3
-
30
-
-
24944554962
-
Fuzzy identity-based encryption
-
A. Sahai and B. Waters. Fuzzy identity-based encryption. In EUROCRYPT, pages 457-473, 2005.
-
(2005)
EUROCRYPT
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
31
-
-
70350649061
-
Predicate privacy in encryption systems
-
E. Shen, E. Shi, and B. Waters. Predicate privacy in encryption systems. In TCC, pages 457-473, 2009.
-
(2009)
TCC
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
32
-
-
78449236216
-
Public-key encryption with registered keyword search
-
Q. Tang and L. Chen. Public-key encryption with registered keyword search. In EuroPKI, pages 163-178, 2009.
-
(2009)
EuroPKI
, pp. 163-178
-
-
Tang, Q.1
Chen, L.2
-
33
-
-
78649325305
-
An efficient public key encryption with conjunctive-subset keywords search
-
B. Zhang and F. Zhang. An efficient public key encryption with conjunctive-subset keywords search. J. Network and Computer Applications, 34(1):262-267, 2011.
-
(2011)
J. Network and Computer Applications
, vol.34
, Issue.1
, pp. 262-267
-
-
Zhang, B.1
Zhang, F.2
-
34
-
-
38349070353
-
Generic combination of public key encryption with keyword search and public key encryption
-
R. Zhang and H. Imai. Generic combination of public key encryption with keyword search and public key encryption. In CANS, pages 159-174, 2007.
-
(2007)
CANS
, pp. 159-174
-
-
Zhang, R.1
Imai, H.2
|