-
1
-
-
33744908786
-
Privacy-Enhanced Searches Using Encrypted Bloom Filters
-
Report 2006/210
-
Bellovin, S., Cheswick, W.: Privacy-Enhanced Searches Using Encrypted Bloom Filters, Cryptology ePrint Archive, Report 2006/210 (2006), http://eprint.iacr.org/
-
(2006)
Cryptology ePrint Archive
-
-
Bellovin, S.1
Cheswick, W.2
-
2
-
-
0031351741
-
A Concrete Security Treatment of Symmetric Encryption
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption. In: FOCS 1997, pp. 394-403 (1997)
-
(1997)
FOCS 1997
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
3
-
-
33646736337
-
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data
-
Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. Springer, Heidelberg
-
Ballard, L., Kamara, S., Monrose, F.: Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 414-426. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3783
, pp. 414-426
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
-
4
-
-
33746214783
-
Efficient conjunctive keyword search on encrypted data storage system
-
Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings
-
Byun, J.W., Lee, D.-H., Lim, J.: Efficient conjunctive keyword search on encrypted data storage system. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 184-196. Springer, Heidelberg (2006) (Pubitemid 44097512)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4043 LNCS
, pp. 184-196
-
-
Byun, J.W.1
Lee, D.H.2
Lim, J.3
-
5
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital signatures
-
Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
-
Benaloh, J., de Mare, M.: One-way accumulators: A decentralized alternative to digital signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274-285. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 274-285
-
-
Benaloh, J.1
De Mare, M.2
-
6
-
-
84957360970
-
Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees
-
Advances in Cryptology - Eurocrypt '97
-
Barić, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 480-494. Springer, Heidelberg (1997) (Pubitemid 127067821)
-
(1997)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1233
, pp. 480-494
-
-
Baric, N.1
Pfitzmann, B.2
-
7
-
-
28144462281
-
Universally Composable Security: A New Paradigm for Cryptographic Protocols
-
Revision 1 of
-
Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols, Revision 1 of ECCC Report TR01-016 (2001)
-
(2001)
ECCC Report TR01-016
-
-
Canetti, R.1
-
8
-
-
4944252049
-
Universally Composable Signatures, Certification and Authentication
-
Report 2003/239
-
Canetti, R.: Universally Composable Signatures, Certification and Authentication, Cryptology ePrint Archive, Report 2003/239 (2003), http://eprint.iacr.org/
-
(2003)
Cryptology ePrint Archive
-
-
Canetti, R.1
-
9
-
-
28144462281
-
Universally Composable Security: A New Paradigm for Cryptographic Protocols
-
Report 2000/067
-
Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols, Cryptology ePrint Archive, Report 2000/067 (2005), http://eprint.iacr.org/
-
(2005)
Cryptology ePrint Archive
-
-
Canetti, R.1
-
10
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM Conference on Computer and Communications Security, pp. 79-88 (2006)
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
11
-
-
84893645385
-
-
Full version of the above: Report 2006/210
-
Full version of the above: Cryptology ePrint Archive, Report 2006/210 (2006), http://eprint.iacr.org/
-
(2006)
Cryptology ePrint Archive
-
-
-
12
-
-
84884472579
-
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. Springer, Heidelberg
-
Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M.-C., Steiner, M.: Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 353-373. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8042
, pp. 353-373
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.3
Krawczyk, H.4
Roşu, M.-C.5
Steiner, M.6
-
13
-
-
78650834524
-
Structured encryption and controlled disclosure
-
Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
-
Chase, M., Kamara, S.: Structured encryption and controlled disclosure. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 577-594. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6477
, pp. 577-594
-
-
Chase, M.1
Kamara, S.2
-
14
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61-76. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
15
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
Chang, Y.-C., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005) (Pubitemid 41422132)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
16
-
-
84957661041
-
Secure hash-and-sign signatures without the random oracle
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Gennaro, R., Halevi, S., Rabin, T.: Secure hash-and-sign signatures without the random oracle. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 123-139. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 123-139
-
-
Gennaro, R.1
Halevi, S.2
Rabin, T.3
-
17
-
-
33244488406
-
Secure Indexes
-
Report 2003/216
-
Goh, E.-J.: Secure Indexes. Cryptology ePrint Archive, Report 2003/216 (2003), http://eprint.iacr.org/
-
(2003)
Cryptology ePrint Archive
-
-
Goh, E.-J.1
-
18
-
-
37149025723
-
On the cost of persistence and authentication in skip lists
-
Experimental Algorithms - 6th International Workshop, WEA 2007, Proceedings
-
Goodrich, M.T., Papamanthou, C., Tamassia, R.: On the Cost of Persistence and Authentication in Skip Lists. In: Demetrescu, C. (ed.)WEA 2007. LNCS, vol. 4525, pp. 94-107. Springer, Heidelberg (2007) (Pubitemid 350259663)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4525 LNCS
, pp. 94-107
-
-
Goodrich, M.T.1
Papamanthou, C.2
Tamassia, R.3
-
19
-
-
33745120364
-
Secure Conjunctive Keyword Search over Encrypted Data
-
Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. Springer, Heidelberg
-
Golle, P., Staddon, J., Waters, B.: Secure Conjunctive Keyword Search over Encrypted Data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31-45. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3089
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
20
-
-
78751547707
-
More Robust Hashing: Cuckoo Hashing with a Stash
-
Kirsch, A., Mitzenmacher, M., Wieder, U.: More Robust Hashing: Cuckoo Hashing with a Stash. SIAM J. Comput. 39(4), 1543-1561 (2009)
-
(2009)
SIAM J. Comput.
, vol.39
, Issue.4
, pp. 1543-1561
-
-
Kirsch, A.1
Mitzenmacher, M.2
Wieder, U.3
-
21
-
-
84865817216
-
UC-Secure Searchable Symmetric Encryption
-
Keromytis, A.D. (ed.) FC 2012. Springer, Heidelberg
-
Kurosawa, K., Ohtaki, Y.: UC-Secure Searchable Symmetric Encryption. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 285-298. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7397
, pp. 285-298
-
-
Kurosawa, K.1
Ohtaki, Y.2
-
22
-
-
84883285558
-
Parallel and Dynamic Searchable Symmetric Encryption
-
Sadeghi, A.-R. (ed.) FC 2013. Springer, Heidelberg
-
Kamara, S., Papamanthou, C.: Parallel and Dynamic Searchable Symmetric Encryption. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 258-274. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7859
, pp. 258-274
-
-
Kamara, S.1
Papamanthou, C.2
-
23
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: ACM Conference on Computer and Communications Security, pp. 965-976 (2012)
-
(2012)
ACM Conference on Computer and Communications Security
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
24
-
-
84893690063
-
-
Merkle Tree, http://en.wikipedia.org/wiki/Merkletree
-
Merkle Tree
-
-
-
25
-
-
0033705124
-
Practical Techniques for Searches on Encrypted Data
-
Song, D., Wagner, D., Perrig, A.: Practical Techniques for Searches on Encrypted Data. In: IEEE Symposium on Security and Privacy 2000, pp. 44-55 (2000)
-
(2000)
IEEE Symposium on Security and Privacy 2000
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
26
-
-
58449092891
-
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups
-
Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. Springer, Heidelberg
-
Wang, P., Wang, H., Pieprzyk, J.: Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 178-195. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5339
, pp. 178-195
-
-
Wang, P.1
Wang, H.2
Pieprzyk, J.3
|