메뉴 건너뛰기




Volumn 62, Issue 11, 2013, Pages 2266-2277

Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack

Author keywords

Identity based encryption; Keyword guessing attack; Public key encryption with fuzzy keyword search; Public key encryption with keyword search

Indexed keywords

GENERIC CONSTRUCTION; GUESSING ATTACKS; IDENTITY BASED ENCRYPTION; KEYWORD SEARCH; POLYNOMIAL SIZE; PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH (PEKS); PUBLIC-KEY ENCRYPTION; VERSATILE TOOLS;

EID: 84884892085     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2012.215     Document Type: Article
Times cited : (228)

References (28)
  • 10
    • 58249100325 scopus 로고    scopus 로고
    • Constructing peks schemes secure against keyword guessing attacks is possible?
    • I.R. Jeong et al., "Constructing PEKS Schemes Secure against Keyword Guessing Attacks Is Possible?" Computer Comm., vol. 32, no. 2, pp. 394-396, 2009
    • (2009) Computer Comm , vol.32 , Issue.2 , pp. 394-396
    • Jeong, I.R.1
  • 15
  • 16
    • 77955188662 scopus 로고    scopus 로고
    • Anonymous multireceiver identity-based encryption
    • Sept
    • C.-I. Fan, L.-Y. Huang, and P.-H. Ho, "Anonymous Multireceiver Identity-Based Encryption," IEEE Trans. Computers, vol. 59, no. 9, pp. 1239-1249, Sept. 2010
    • (2010) IEEE Trans. Computers , vol.59 , Issue.9 , pp. 1239-1249
    • Fan, C.-I.1    Huang, L.-Y.2    Ho, P.-H.3
  • 19
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Y.H. Hwang and P.J. Lee, "Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-User System," Proc. Pairing Based Cryptography Conf., pp. 2-22, 2007
    • (2007) Proc. Pairing Based Cryptography Conf , pp. 2-22
    • Hwang, Y.H.1    Lee, P.J.2
  • 20
    • 38049001725 scopus 로고    scopus 로고
    • Anonymous multi-attribute encryption with range query and conditional decryption
    • Carnegie Mellon Univ
    • J. Bethencourt et al., "Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption," Technical Report CMU-CS-06-135, Carnegie Mellon Univ., 2006
    • (2006) Technical Report CMU-CS-06-135
    • Bethencourt, J.1
  • 23
  • 24
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • Sept
    • A.J. Menezes, T. Okamoto, and S.A. Vanstone, "Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field," IEEE Trans. Information Theory, vol. 39, no. 5, pp. 1639-1646, Sept. 1993
    • (1993) IEEE Trans. Information Theory , vol.39 , Issue.5 , pp. 1639-1646
    • Menezes, A.J.1    Okamoto, T.2    Vanstone, S.A.3
  • 25
    • 0032649638 scopus 로고    scopus 로고
    • The tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
    • July
    • G. Frey, M. Muller, and H.-G. Ruck, "The Tate Pairing and the Discrete Logarithm Applied to Elliptic Curve Cryptosystems," IEEE Trans. Information Theory, vol. 45, no. 5, pp. 1717-1719, July 1999
    • (1999) IEEE Trans. Information Theory , vol.45 , Issue.5 , pp. 1717-1719
    • Frey, G.1    Muller, M.2    Ruck, H.-G.3
  • 26
    • 74949125309 scopus 로고    scopus 로고
    • Moving beyond kucera and francis:A critical evaluation of current
    • Word Frequency Norms and the Introduction of a New and Improved Word Frequency Measure for American English
    • M. Brysbaert and B. New, "Moving Beyond Kucera and Francis:a Critical Evaluation of Current Word Frequency Norms and the Introduction of a New and Improved Word Frequency Measure for American English," Behavior Research Methods, vol. 49, no. 4, pp. 977-990, 2009
    • (2009) Behavior Research Methods , vol.49 , Issue.4 , pp. 977-990
    • Brysbaert, M.1    New, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.