메뉴 건너뛰기




Volumn , Issue , 2013, Pages 253-264

Towards asymmetric searchable encryption with message recovery and flexible search authorization

Author keywords

cloud computing; data outsourcing; privacy; searchable encryption

Indexed keywords

DATA OUTSOURCING; ENABLING TECHNIQUES; ENCRYPTION TECHNIQUE; INDISTINGUISHABILITY; INFORMATION LEAKAGE; RANDOM ORACLE MODEL; SEARCHABLE ENCRYPTIONS; SECURITY PROPERTIES;

EID: 84877993743     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2484313.2484346     Document Type: Conference Paper
Times cited : (13)

References (16)
  • 1
    • 33750246968 scopus 로고    scopus 로고
    • On the integration of public key data encryption and public key encryption with keyword search
    • S. K. Katsikas et al., editor, Proceedings of the 9th international conference on Information Security, Springer
    • J. Baek, R. Safavi-Naini, and W. Susilo. On the integration of public key data encryption and public key encryption with keyword search. In S. K. Katsikas et al., editor, Proceedings of the 9th international conference on Information Security, volume 4176 of LNCS, pages 217-232. Springer, 2006.
    • (2006) LNCS , vol.4176 , pp. 217-232
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 3
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • M. K. Franklin, editor, Advances in Cryptology - CRYPTO 2004, Springer
    • D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In M. K. Franklin, editor, Advances in Cryptology - CRYPTO 2004, volume 3152 of LNCS, pages 41-55. Springer, 2004.
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 4
    • 35048901123 scopus 로고    scopus 로고
    • Public Key Encryption with Keyword Search
    • C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, Springer
    • D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. Public Key Encryption with Keyword Search. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages 506-522. Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • J. Kilian, editor, Advances in Cryptology - CRYPTO 2001, Springer
    • D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. In J. Kilian, editor, Advances in Cryptology - CRYPTO 2001, volume 2139 of LNCS, pages 213-229. Springer, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 6
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • G. R. Blakley and D. Chaum, editors, Advances in Cryptology - CRYPTO 1984, Springer
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In G. R. Blakley and D. Chaum, editors, Advances in Cryptology - CRYPTO 1984, volume 196 of LNCS, pages 10-18. Springer, 1985.
    • (1985) LNCS , vol.196 , pp. 10-18
    • ElGamal, T.1
  • 9
    • 79959313029 scopus 로고    scopus 로고
    • Public-key encryption with delegated search
    • J. Lopez and G. Tsudik, editors, Applied Cryptography and Network Security - 9th International Conference
    • L. Ibraimi, S. Nikova, P. H. Hartel, and W. Jonker. Public-key encryption with delegated search. In J. Lopez and G. Tsudik, editors, Applied Cryptography and Network Security - 9th International Conference, volume 6715 of LNCS, pages 532-549, 2011.
    • (2011) LNCS , vol.6715 , pp. 532-549
    • Ibraimi, L.1    Nikova, S.2    Hartel, P.H.3    Jonker, W.4
  • 13
    • 84877960292 scopus 로고    scopus 로고
    • Search in encrypted data: Theoretical models and practical applications
    • Q. Tang. Search in encrypted data: Theoretical models and practical applications. Cryptology ePrint Archive: Report 2012/648, 2012.
    • (2012) Cryptology ePrint Archive: Report 2012/648
    • Tang, Q.1
  • 15
    • 23044474013 scopus 로고    scopus 로고
    • Evidence that xtr is more secure than supersingular elliptic curve cryptosystems
    • E. R. Verheul. Evidence that xtr is more secure than supersingular elliptic curve cryptosystems. J. Cryptol., 17(4):277-296, 2004.
    • (2004) J. Cryptol. , vol.17 , Issue.4 , pp. 277-296
    • Verheul, E.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.