메뉴 건너뛰기




Volumn 9408, Issue , 2015, Pages 239-253

CLKS: Certificateless keyword search on encrypted data

Author keywords

Certificateless cryptography; Keyword search

Indexed keywords

CRYPTOGRAPHY; SEARCH ENGINES; SECURITY OF DATA;

EID: 84952323874     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-25645-0_16     Document Type: Conference Paper
Times cited : (40)

References (36)
  • 2
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Laih, C.-S. (ed.), LNCS, Springer, Heidelberg
    • Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
    • (2003) ASIACRYPT 2003 , vol.2894 , pp. 452-473
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 3
    • 33645958856 scopus 로고    scopus 로고
    • Certificateless public key encryption without pairing
    • Zhou, J., López, J., Deng, R.H., Bao, F. (eds.), LNCS, Springer, Heidelberg
    • Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134-148. Springer, Heidelberg (2005)
    • (2005) ISC 2005 , vol.3650 , pp. 134-148
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 4
    • 54249101916 scopus 로고    scopus 로고
    • Public key encryption with keyword search revisited
    • Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.), LNCS, Springer, Heidelberg
    • Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 1249-1259. Springer, Heidelberg (2008)
    • (2008) ICCSA 2008, Part I , vol.5072 , pp. 1249-1259
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 5
    • 41549164259 scopus 로고    scopus 로고
    • Private query on encrypted data in multiuser settings
    • Chen, L., Mu, Y., Susilo, W. (eds.), LNCS, Springer, Heidelberg
    • Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private query on encrypted data in multiuser settings. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 71-85. Springer, Heidelberg (2008)
    • (2008) ISPEC 2008 , vol.4991 , pp. 71-85
    • Bao, F.1    Deng, R.H.2    Ding, X.3    Yang, Y.4
  • 6
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Cachin, C., Camenisch, J.L. (eds.), LNCS, Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004 , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 7
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • Vadhan, S.P. (ed.), LNCS, Springer, Heidelberg
    • Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535-554. Springer, Heidelberg (2007)
    • (2007) TCC 2007 , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 9
    • 67049154037 scopus 로고    scopus 로고
    • Blind and anonymous identitybased encryption and authorised private searches on public key encrypted data
    • Jarecki, S., Tsudik, G. (eds.), LNCS, Springer, Heidelberg
    • Camenisch, J., Kohlweiss, M., Rial, A., Sheedy, C.: Blind and anonymous identitybased encryption and authorised private searches on public key encrypted data. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 196-214. Springer, Heidelberg (2009)
    • (2009) PKC 2009 , vol.5443 , pp. 196-214
    • Camenisch, J.1    Kohlweiss, M.2    Rial, A.3    Sheedy, C.4
  • 10
    • 84905923774 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222-233 (2014)
    • (2014) IEEE Trans. Parallel Distrib. Syst , vol.25 , Issue.1 , pp. 222-233
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 11
    • 84871978542 scopus 로고    scopus 로고
    • Verifiable symmetric searchable encryption for semi-honestbut-curious cloud servers
    • Ottawa, ON, Canada
    • Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honestbut-curious cloud servers. In: ICC 2012, Ottawa, ON, Canada, pp. 917-922 (2012)
    • (2012) ICC 2012 , pp. 917-922
    • Chai, Q.1    Gong, G.2
  • 12
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Ioannidis, J., Keromytis, A.D., Yung, M. (eds.), LNCS, Springer, Heidelberg
    • Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005)
    • (2005) ACNS 2005 , vol.3531 , pp. 442-455
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 14
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • Alexandria, VA, USA
    • Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: CCS 2006, Alexandria, VA, USA, pp. 79-88 (2006)
    • (2006) CCS 2006 , pp. 79-88
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 16
    • 67049104242 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2006/260
    • Dent, A.W.: A note on game-hopping proofs. Cryptology ePrint Archive, Report 2006/260 (2006). http://eprint.iacr.org/
    • (2006) A note on game-hopping proofs
    • Dent, A.W.1
  • 17
    • 33244488406 scopus 로고    scopus 로고
    • IACR Cryptology ePrint Archive, 2003:216
    • Goh, E.: Secure indexes. IACR Cryptology ePrint Archive, 2003:216 (2003)
    • (2003) Secure indexes
    • Goh, E.1
  • 19
    • 84859198768 scopus 로고    scopus 로고
    • An enhanced searchable public key encryption scheme with a designated tester and its extensions
    • Hu, C., Liu, P.: An enhanced searchable public key encryption scheme with a designated tester and its extensions. JCP 7(3), 716-723 (2012)
    • (2012) JCP , vol.7 , Issue.3 , pp. 716-723
    • Hu, C.1    Liu, P.2
  • 20
    • 84862960819 scopus 로고    scopus 로고
    • Distilling critical attack graph surface iteratively through minimum-cost SAT solving
    • Orlando, FL, USA
    • Huang, H., Zhang, S., Ou, X., Prakash, A., Sakallah, K.A.: Distilling critical attack graph surface iteratively through minimum-cost SAT solving. In: ACSAC 2011, Orlando, FL, USA, pp. 31-40 (2011)
    • (2011) ACSAC 2011 , pp. 31-40
    • Huang, H.1    Zhang, S.2    Ou, X.3    Prakash, A.4    Sakallah, K.A.5
  • 21
    • 84889073373 scopus 로고    scopus 로고
    • Outsourced symmetric private information retrieval
    • Berlin, Germany
    • Jarecki, S., Jutla, C.S., Krawczyk, H., Rosu, M., Steiner, M.: Outsourced symmetric private information retrieval. In: CCS 2013, Berlin, Germany, pp. 875-888 (2013)
    • (2013) CCS 2013 , pp. 875-888
    • Jarecki, S.1    Jutla, C.S.2    Krawczyk, H.3    Rosu, M.4    Steiner, M.5
  • 22
    • 84869394463 scopus 로고    scopus 로고
    • Dynamic searchable symmetric encryption
    • Raleigh, NC, USA
    • Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: CCS 2012, Raleigh, NC, USA, pp. 965-976 (2012)
    • (2012) CCS 2012 , pp. 965-976
    • Kamara, S.1    Papamanthou, C.2    Roeder, T.3
  • 23
    • 84865817216 scopus 로고    scopus 로고
    • UC-secure searchable symmetric encryption
    • Keromytis, A.D. (ed.), LNCS, Springer, Heidelberg
    • Kurosawa, K., Ohtaki, Y.: UC-secure searchable symmetric encryption. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 285-298. Springer, Heidelberg (2012)
    • (2012) FC 2012 , vol.7397 , pp. 285-298
    • Kurosawa, K.1    Ohtaki, Y.2
  • 24
    • 77649179760 scopus 로고    scopus 로고
    • Trapdoor security in a searchable public-key encryption scheme with a designated tester
    • Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software 83(5), 763-771 (2010)
    • (2010) Journal of Systems and Software , vol.83 , Issue.5 , pp. 763-771
    • Rhee, H.S.1    Park, J.H.2    Susilo, W.3    Lee, D.H.4
  • 25
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • Reingold, O. (ed.), LNCS, Springer, Heidelberg
    • Shen, E., Shi, E., Waters, B.: Predicate privacy in encryption systems. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 457-473. Springer, Heidelberg (2009)
    • (2009) TCC 2009 , vol.5444 , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 26
    • 84906483101 scopus 로고    scopus 로고
    • Authorized keyword search on encrypted data
    • Kutyłowski, M., Vaidya, J. (eds.), LNCS, Springer, Heidelberg
    • Shi, J., Lai, J., Li, Y., Deng, R.H., Weng, J.: Authorized keyword search on encrypted data. In: Kutyłowski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 419-435. Springer, Heidelberg (2014)
    • (2014) ICAIS 2014, Part I , vol.8712 , pp. 419-435
    • Shi, J.1    Lai, J.2    Li, Y.3    Deng, R.H.4    Weng, J.5
  • 27
  • 28
    • 84904444112 scopus 로고    scopus 로고
    • Protecting your right: Attributebased keyword search with fine-grained owner-enforced search authorization in the cloud
    • Toronto, Canada
    • Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: attributebased keyword search with fine-grained owner-enforced search authorization in the cloud. In: 2014 IEEE Conference on Computer Communikations, INFOCOM 2014, Toronto, Canada, pp. 226-234 (2014)
    • (2014) 2014 IEEE Conference on Computer Communikations, INFOCOM 2014 , pp. 226-234
    • Sun, W.1    Yu, S.2    Lou, W.3    Hou, Y.T.4    Li, H.5
  • 30
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467-1479 (2012)
    • (2012) IEEE Trans. Parallel Distrib. Syst , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 32
    • 84872004857 scopus 로고    scopus 로고
    • CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud
    • Seoul, Korea
    • Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: ASIACCS 2012, Seoul, Korea, pp. 87-88 (2012)
    • (2012) ASIACCS 2012 , pp. 87-88
    • Xu, L.1    Wu, X.2    Zhang, X.3
  • 33
    • 84984871051 scopus 로고    scopus 로고
    • After we knew it: Empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud
    • Kyoto, Japan -June 03-06, 2014
    • Zhang, S., Zhang, X., Ou, X.: After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud. In: ASIA CCS 2014, Kyoto, Japan -June 03-06, 2014, pp. 317-328 (2014)
    • (2014) ASIA CCS 2014 , pp. 317-328
    • Zhang, S.1    Zhang, X.2    Ou, X.3
  • 34
    • 84904410658 scopus 로고    scopus 로고
    • VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
    • Toronto, Canada, April 27 -May 2, 2014
    • Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: 2014 IEEE Conference on Computer Communikations, INFOCOM 2014, Toronto, Canada, April 27 -May 2, 2014, pp. 522-530 (2014)
    • (2014) 2014 IEEE Conference on Computer Communikations, INFOCOM 2014 , pp. 522-530
    • Zheng, Q.1    Xu, S.2    Ateniese, G.3
  • 36
    • 80052165941 scopus 로고    scopus 로고
    • Peksrand: Providing predicate privacy in public-key encryption with keyword search
    • Kyoto, Japan, June 5-9, 2011
    • Zhu, B., Zhu B., Ren, K.: Peksrand: providing predicate privacy in public-key encryption with keyword search. In: Proceedings of IEEE International Conference on Communications, ICC 2011, Kyoto, Japan, June 5-9, 2011, pp. 1-6 (2011)
    • (2011) Proceedings of IEEE International Conference on Communications, ICC 2011 , pp. 1-6
    • Zhu, B.1    Zhu, B.2    Ren, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.