메뉴 건너뛰기




Volumn , Issue , 2013, Pages 243-251

Expressive search on encrypted data

Author keywords

anonymous key policy attribute based encryption; public key encryption with keyword search; searchable public key encryption

Indexed keywords

ATTRIBUTE-BASED ENCRYPTION SCHEMES; ATTRIBUTE-BASED ENCRYPTIONS; CONJUNCTIVE QUERIES; NEW CONSTRUCTIONS; PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCHES; PUBLIC-KEY ENCRYPTION; SEARCHABLE PUBLIC KEY ENCRYPTIONS; THE STANDARD MODEL;

EID: 84877967287     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2484313.2484345     Document Type: Conference Paper
Times cited : (59)

References (34)
  • 2
    • 33750246968 scopus 로고    scopus 로고
    • On the integration of public key data encryption and public key encryption with keyword search
    • J. Baek, R. Safavi-Naini, and W. Susilo. On the integration of public key data encryption and public key encryption with keyword search. In ISC, pages 217-232, 2006.
    • (2006) ISC , pp. 217-232
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 3
    • 54249101916 scopus 로고    scopus 로고
    • Public key encryption with keyword search revisited
    • J. Baek, R. Safavi-Naini, and W. Susilo. Public key encryption with keyword search revisited. In ICCSA (1), pages 1249-1259, 2008.
    • (2008) ICCSA (1) , pp. 1249-1259
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 5
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • M. Bellare, A. Boldyreva, and A. O'Neill. Deterministic and efficiently searchable encryption. In CRYPTO, pages 535-552, 2007.
    • (2007) CRYPTO , pp. 535-552
    • Bellare, M.1    Boldyreva, A.2    O'Neill, A.3
  • 6
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422-426, 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 8
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-dnf formulas on ciphertexts
    • D. Boneh, E.-J. Goh, and K. Nissim. Evaluating 2-dnf formulas on ciphertexts. In TCC, pages 325-341, 2005.
    • (2005) TCC , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 10
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In TCC, pages 535-554, 2007.
    • (2007) TCC , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 11
    • 70449490810 scopus 로고    scopus 로고
    • Error-tolerant searchable encryption
    • J. Bringer, H. Chabanne, and B. Kindarji. Error-tolerant searchable encryption. In ICC, pages 1-6, 2009.
    • (2009) ICC , pp. 1-6
    • Bringer, J.1    Chabanne, H.2    Kindarji, B.3
  • 12
    • 33750696320 scopus 로고    scopus 로고
    • Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
    • J. W. Byun, H. S. Rhee, H.-A. Park, and D. H. Lee. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Secure Data Management, pages 75-83, 2006.
    • (2006) Secure Data Management , pp. 75-83
    • Byun, J.W.1    Rhee, H.S.2    Park, H.-A.3    Lee, D.H.4
  • 13
    • 38349025630 scopus 로고    scopus 로고
    • Public key encryption with searchable keywords based on jacobi symbols
    • G. D. Crescenzo and V. Saraswat. Public key encryption with searchable keywords based on jacobi symbols. In INDOCRYPT, pages 282-296, 2007.
    • (2007) INDOCRYPT , pp. 282-296
    • Crescenzo, G.D.1    Saraswat, V.2
  • 14
    • 71549153479 scopus 로고    scopus 로고
    • A secure channel free public key encryption with keyword search scheme without random oracle
    • L. Fang, W. Susilo, C. Ge, and J. Wang. A secure channel free public key encryption with keyword search scheme without random oracle. In CANS, pages 248-258, 2009.
    • (2009) CANS , pp. 248-258
    • Fang, L.1    Susilo, W.2    Ge, C.3    Wang, J.4
  • 15
    • 38149055585 scopus 로고    scopus 로고
    • Decryptable searchable encryption
    • T. Fuhr and P. Paillier. Decryptable searchable encryption. In ProvSec, pages 228-236, 2007.
    • (2007) ProvSec , pp. 228-236
    • Fuhr, T.1    Paillier, P.2
  • 16
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • P. Golle, J. Staddon, and B. R. Waters. Secure conjunctive keyword search over encrypted data. In ACNS, pages 31-45, 2004.
    • (2004) ACNS , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.R.3
  • 18
    • 54249087643 scopus 로고    scopus 로고
    • Efficient public key encryption with keyword search schemes from pairings
    • C. Gu, Y. Zhu, and H. Pan. Efficient public key encryption with keyword search schemes from pairings. In Inscrypt, pages 372-383, 2007.
    • (2007) Inscrypt , pp. 372-383
    • Gu, C.1    Zhu, Y.2    Pan, H.3
  • 19
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Y. H. Hwang and P. J. Lee. Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Pairing, pages 2-22, 2007.
    • (2007) Pairing , pp. 2-22
    • Hwang, Y.H.1    Lee, P.J.2
  • 20
    • 44449142730 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. IACR Cryptology ePrint Archive, 2007:404, 2007.
    • (2007) IACR Cryptology EPrint Archive , vol.2007 , pp. 404
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 21
    • 33745922362 scopus 로고    scopus 로고
    • Public key encryption with keyword search based on k-resilient ibe
    • D. Khader. Public key encryption with keyword search based on k-resilient ibe. In ICCSA (3), pages 298-308, 2006.
    • (2006) ICCSA (3) , pp. 298-308
    • Khader, D.1
  • 22
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In EUROCRYPT, pages 62-91, 2010.
    • (2010) EUROCRYPT , pp. 62-91
    • Lewko, A.B.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 23
    • 77949581448 scopus 로고    scopus 로고
    • New techniques for dual system encryption and fully secure hibe with short ciphertexts
    • A. B. Lewko and B. Waters. New techniques for dual system encryption and fully secure hibe with short ciphertexts. In TCC, pages 455-479, 2010.
    • (2010) TCC , pp. 455-479
    • Lewko, A.B.1    Waters, B.2
  • 24
    • 79957993008 scopus 로고    scopus 로고
    • Decentralizing attribute-based encryption
    • A. B. Lewko and B. Waters. Decentralizing attribute-based encryption. In EUROCRYPT, pages 568-588, 2011.
    • (2011) EUROCRYPT , pp. 568-588
    • Lewko, A.B.1    Waters, B.2
  • 25
    • 84865479255 scopus 로고    scopus 로고
    • New proof methods for attribute-based encryption: Achieving full security through selective techniques
    • A. B. Lewko and B. Waters. New proof methods for attribute-based encryption: Achieving full security through selective techniques. In CRYPTO, pages 180-198, 2012.
    • (2012) CRYPTO , pp. 180-198
    • Lewko, A.B.1    Waters, B.2
  • 26
    • 23944469009 scopus 로고    scopus 로고
    • Public key encryption with conjunctive field keyword search
    • D. J. Park, K. Kim, and P. J. Lee. Public key encryption with conjunctive field keyword search. In WISA, pages 73-86, 2004.
    • (2004) WISA , pp. 73-86
    • Park, D.J.1    Kim, K.2    Lee, P.J.3
  • 27
    • 71549160150 scopus 로고    scopus 로고
    • Improved searchable public key encryption with designated tester
    • H. S. Rhee, J. H. Park, W. Susilo, and D. H. Lee. Improved searchable public key encryption with designated tester. In ASIACCS, pages 376-379, 2009.
    • (2009) ASIACCS , pp. 376-379
    • Rhee, H.S.1    Park, J.H.2    Susilo, W.3    Lee, D.H.4
  • 28
    • 77649179760 scopus 로고    scopus 로고
    • Trapdoor security in a searchable public-key encryption scheme with a designated tester
    • H. S. Rhee, J. H. Park, W. Susilo, and D. H. Lee. Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software, 83(5):763-771, 2010.
    • (2010) Journal of Systems and Software , vol.83 , Issue.5 , pp. 763-771
    • Rhee, H.S.1    Park, J.H.2    Susilo, W.3    Lee, D.H.4
  • 29
    • 64949106593 scopus 로고    scopus 로고
    • Secure searchable public key encryption scheme against keyword guessing attacks
    • H. S. Rhee, W. Susilo, and H.-J. Kim. Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electronics Express, 6(5):237-243, 2009.
    • (2009) IEICE Electronics Express , vol.6 , Issue.5 , pp. 237-243
    • Rhee, H.S.1    Susilo, W.2    Kim, H.-J.3
  • 30
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • A. Sahai and B. Waters. Fuzzy identity-based encryption. In EUROCRYPT, pages 457-473, 2005.
    • (2005) EUROCRYPT , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 31
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • E. Shen, E. Shi, and B. Waters. Predicate privacy in encryption systems. In TCC, pages 457-473, 2009.
    • (2009) TCC , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 32
    • 78449236216 scopus 로고    scopus 로고
    • Public-key encryption with registered keyword search
    • Q. Tang and L. Chen. Public-key encryption with registered keyword search. In EuroPKI, pages 163-178, 2009.
    • (2009) EuroPKI , pp. 163-178
    • Tang, Q.1    Chen, L.2
  • 33
    • 78649325305 scopus 로고    scopus 로고
    • An efficient public key encryption with conjunctive-subset keywords search
    • B. Zhang and F. Zhang. An efficient public key encryption with conjunctive-subset keywords search. J. Network and Computer Applications, 34(1):262-267, 2011.
    • (2011) J. Network and Computer Applications , vol.34 , Issue.1 , pp. 262-267
    • Zhang, B.1    Zhang, F.2
  • 34
    • 38349070353 scopus 로고    scopus 로고
    • Generic combination of public key encryption with keyword search and public key encryption
    • R. Zhang and H. Imai. Generic combination of public key encryption with keyword search and public key encryption. In CANS, pages 159-174, 2007.
    • (2007) CANS , pp. 159-174
    • Zhang, R.1    Imai, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.