-
1
-
-
43449138479
-
Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
-
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. J. Cryptol. 21(3), 350-391 (2008)
-
(2008)
J. Cryptol
, vol.21
, Issue.3
, pp. 350-391
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
0345490607
-
Certificateless public key cryptography
-
Laih, C.-S. (ed.), LNCS, Springer, Heidelberg
-
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
-
(2003)
ASIACRYPT 2003
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
3
-
-
33645958856
-
Certificateless public key encryption without pairing
-
Zhou, J., López, J., Deng, R.H., Bao, F. (eds.), LNCS, Springer, Heidelberg
-
Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134-148. Springer, Heidelberg (2005)
-
(2005)
ISC 2005
, vol.3650
, pp. 134-148
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
4
-
-
54249101916
-
Public key encryption with keyword search revisited
-
Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.), LNCS, Springer, Heidelberg
-
Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 1249-1259. Springer, Heidelberg (2008)
-
(2008)
ICCSA 2008, Part I
, vol.5072
, pp. 1249-1259
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
5
-
-
41549164259
-
Private query on encrypted data in multiuser settings
-
Chen, L., Mu, Y., Susilo, W. (eds.), LNCS, Springer, Heidelberg
-
Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private query on encrypted data in multiuser settings. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 71-85. Springer, Heidelberg (2008)
-
(2008)
ISPEC 2008
, vol.4991
, pp. 71-85
-
-
Bao, F.1
Deng, R.H.2
Ding, X.3
Yang, Y.4
-
6
-
-
35048901123
-
Public key encryption with keyword search
-
Cachin, C., Camenisch, J.L. (eds.), LNCS, Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
7
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Vadhan, S.P. (ed.), LNCS, Springer, Heidelberg
-
Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535-554. Springer, Heidelberg (2007)
-
(2007)
TCC 2007
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
8
-
-
84910093538
-
Distributed searchable symmetric encryption
-
Toronto, ON, Canada, 2014
-
Bösch, C., Peter, A., Leenders, B., Lim, H.W., Tang, Q., Wang, H., Hartel, P.H., Jonker, W.: Distributed searchable symmetric encryption. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, 2014, pp. 330-337 (2014)
-
(2014)
2014 Twelfth Annual International Conference on Privacy, Security and Trust
, pp. 330-337
-
-
Bösch, C.1
Peter, A.2
Leenders, B.3
Lim, H.W.4
Tang, Q.5
Wang, H.6
Hartel, P.H.7
Jonker, W.8
-
9
-
-
67049154037
-
Blind and anonymous identitybased encryption and authorised private searches on public key encrypted data
-
Jarecki, S., Tsudik, G. (eds.), LNCS, Springer, Heidelberg
-
Camenisch, J., Kohlweiss, M., Rial, A., Sheedy, C.: Blind and anonymous identitybased encryption and authorised private searches on public key encrypted data. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 196-214. Springer, Heidelberg (2009)
-
(2009)
PKC 2009
, vol.5443
, pp. 196-214
-
-
Camenisch, J.1
Kohlweiss, M.2
Rial, A.3
Sheedy, C.4
-
10
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222-233 (2014)
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
11
-
-
84871978542
-
Verifiable symmetric searchable encryption for semi-honestbut-curious cloud servers
-
Ottawa, ON, Canada
-
Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honestbut-curious cloud servers. In: ICC 2012, Ottawa, ON, Canada, pp. 917-922 (2012)
-
(2012)
ICC 2012
, pp. 917-922
-
-
Chai, Q.1
Gong, G.2
-
12
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Ioannidis, J., Keromytis, A.D., Yung, M. (eds.), LNCS, Springer, Heidelberg
-
Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005)
-
(2005)
ACNS 2005
, vol.3531
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
13
-
-
84906863889
-
-
Cryptology ePrint Archive, Report 2013/193
-
Chen, Y.-C., Tso, R., Susilo, W., Huang, X., Horng, G.: Certificateless signatures: Structural extensions of security models and new provably secure schemes. Cryptology ePrint Archive, Report 2013/193 (2013). http://eprint.iacr.org/
-
(2013)
Certificateless signatures: Structural extensions of security models and new provably secure schemes
-
-
Chen, Y.-C.1
Tso, R.2
Susilo, W.3
Huang, X.4
Horng, G.5
-
14
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Alexandria, VA, USA
-
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: CCS 2006, Alexandria, VA, USA, pp. 79-88 (2006)
-
(2006)
CCS 2006
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
15
-
-
80052701910
-
jpbc: Java pairing based cryptography
-
Kerkyra, Corfu, Greece
-
De Caro, A., Iovino, V.: jpbc: Java pairing based cryptography. In: Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC 2011, Kerkyra, Corfu, Greece, pp. 850-855 (2011)
-
(2011)
Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC 2011
, pp. 850-855
-
-
De Caro, A.1
Iovino, V.2
-
16
-
-
67049104242
-
-
Cryptology ePrint Archive, Report 2006/260
-
Dent, A.W.: A note on game-hopping proofs. Cryptology ePrint Archive, Report 2006/260 (2006). http://eprint.iacr.org/
-
(2006)
A note on game-hopping proofs
-
-
Dent, A.W.1
-
17
-
-
33244488406
-
-
IACR Cryptology ePrint Archive, 2003:216
-
Goh, E.: Secure indexes. IACR Cryptology ePrint Archive, 2003:216 (2003)
-
(2003)
Secure indexes
-
-
Goh, E.1
-
18
-
-
84890017132
-
Aggregating vulnerability metrics in enterprise networks using attack graphs
-
Homer, J., Zhang, S., Ou, X., Schmidt, D., Du, Y., Rajagopalan, S.R., Singhal, A.: Aggregating vulnerability metrics in enterprise networks using attack graphs. Journal of Computer Security 21(4), 561-597 (2013)
-
(2013)
Journal of Computer Security
, vol.21
, Issue.4
, pp. 561-597
-
-
Homer, J.1
Zhang, S.2
Ou, X.3
Schmidt, D.4
Du, Y.5
Rajagopalan, S.R.6
Singhal, A.7
-
19
-
-
84859198768
-
An enhanced searchable public key encryption scheme with a designated tester and its extensions
-
Hu, C., Liu, P.: An enhanced searchable public key encryption scheme with a designated tester and its extensions. JCP 7(3), 716-723 (2012)
-
(2012)
JCP
, vol.7
, Issue.3
, pp. 716-723
-
-
Hu, C.1
Liu, P.2
-
20
-
-
84862960819
-
Distilling critical attack graph surface iteratively through minimum-cost SAT solving
-
Orlando, FL, USA
-
Huang, H., Zhang, S., Ou, X., Prakash, A., Sakallah, K.A.: Distilling critical attack graph surface iteratively through minimum-cost SAT solving. In: ACSAC 2011, Orlando, FL, USA, pp. 31-40 (2011)
-
(2011)
ACSAC 2011
, pp. 31-40
-
-
Huang, H.1
Zhang, S.2
Ou, X.3
Prakash, A.4
Sakallah, K.A.5
-
21
-
-
84889073373
-
Outsourced symmetric private information retrieval
-
Berlin, Germany
-
Jarecki, S., Jutla, C.S., Krawczyk, H., Rosu, M., Steiner, M.: Outsourced symmetric private information retrieval. In: CCS 2013, Berlin, Germany, pp. 875-888 (2013)
-
(2013)
CCS 2013
, pp. 875-888
-
-
Jarecki, S.1
Jutla, C.S.2
Krawczyk, H.3
Rosu, M.4
Steiner, M.5
-
22
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
Raleigh, NC, USA
-
Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: CCS 2012, Raleigh, NC, USA, pp. 965-976 (2012)
-
(2012)
CCS 2012
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
23
-
-
84865817216
-
UC-secure searchable symmetric encryption
-
Keromytis, A.D. (ed.), LNCS, Springer, Heidelberg
-
Kurosawa, K., Ohtaki, Y.: UC-secure searchable symmetric encryption. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 285-298. Springer, Heidelberg (2012)
-
(2012)
FC 2012
, vol.7397
, pp. 285-298
-
-
Kurosawa, K.1
Ohtaki, Y.2
-
24
-
-
77649179760
-
Trapdoor security in a searchable public-key encryption scheme with a designated tester
-
Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software 83(5), 763-771 (2010)
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.5
, pp. 763-771
-
-
Rhee, H.S.1
Park, J.H.2
Susilo, W.3
Lee, D.H.4
-
25
-
-
70350649061
-
Predicate privacy in encryption systems
-
Reingold, O. (ed.), LNCS, Springer, Heidelberg
-
Shen, E., Shi, E., Waters, B.: Predicate privacy in encryption systems. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 457-473. Springer, Heidelberg (2009)
-
(2009)
TCC 2009
, vol.5444
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
26
-
-
84906483101
-
Authorized keyword search on encrypted data
-
Kutyłowski, M., Vaidya, J. (eds.), LNCS, Springer, Heidelberg
-
Shi, J., Lai, J., Li, Y., Deng, R.H., Weng, J.: Authorized keyword search on encrypted data. In: Kutyłowski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 419-435. Springer, Heidelberg (2014)
-
(2014)
ICAIS 2014, Part I
, vol.8712
, pp. 419-435
-
-
Shi, J.1
Lai, J.2
Li, Y.3
Deng, R.H.4
Weng, J.5
-
27
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Berkeley, California, USA
-
Song, D.X., Wagner, D., Perrig. A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp. 44-55 (2000)
-
(2000)
2000 IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
28
-
-
84904444112
-
Protecting your right: Attributebased keyword search with fine-grained owner-enforced search authorization in the cloud
-
Toronto, Canada
-
Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: attributebased keyword search with fine-grained owner-enforced search authorization in the cloud. In: 2014 IEEE Conference on Computer Communikations, INFOCOM 2014, Toronto, Canada, pp. 226-234 (2014)
-
(2014)
2014 IEEE Conference on Computer Communikations, INFOCOM 2014
, pp. 226-234
-
-
Sun, W.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
Li, H.5
-
29
-
-
84877993743
-
Towards asymmetric searchable encryption with message recovery and flexible search authorization
-
Hangzhou, China
-
Tang, Q., Chen, X.: Towards asymmetric searchable encryption with message recovery and flexible search authorization. In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China, pp. 253-264 (2013)
-
(2013)
8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2013
, pp. 253-264
-
-
Tang, Q.1
Chen, X.2
-
30
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467-1479 (2012)
-
(2012)
IEEE Trans. Parallel Distrib. Syst
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
31
-
-
84904563413
-
-
Springer Paris
-
Wu, T.-Y., Tsai, T.-T., Tseng, Y.-M.: Efficient searchable id-based encryption with a designated server, vol. 69, pp. 391-402. Springer Paris (2014)
-
(2014)
Efficient searchable id-based encryption with a designated server
, vol.69
, pp. 391-402
-
-
Wu, T.-Y.1
Tsai, T.-T.2
Tseng, Y.-M.3
-
32
-
-
84872004857
-
CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud
-
Seoul, Korea
-
Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: ASIACCS 2012, Seoul, Korea, pp. 87-88 (2012)
-
(2012)
ASIACCS 2012
, pp. 87-88
-
-
Xu, L.1
Wu, X.2
Zhang, X.3
-
33
-
-
84984871051
-
After we knew it: Empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud
-
Kyoto, Japan -June 03-06, 2014
-
Zhang, S., Zhang, X., Ou, X.: After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud. In: ASIA CCS 2014, Kyoto, Japan -June 03-06, 2014, pp. 317-328 (2014)
-
(2014)
ASIA CCS 2014
, pp. 317-328
-
-
Zhang, S.1
Zhang, X.2
Ou, X.3
-
34
-
-
84904410658
-
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
-
Toronto, Canada, April 27 -May 2, 2014
-
Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: 2014 IEEE Conference on Computer Communikations, INFOCOM 2014, Toronto, Canada, April 27 -May 2, 2014, pp. 522-530 (2014)
-
(2014)
2014 IEEE Conference on Computer Communikations, INFOCOM 2014
, pp. 522-530
-
-
Zheng, Q.1
Xu, S.2
Ateniese, G.3
-
35
-
-
84952339240
-
-
Cryptology ePrint Archive, Report 2015/814
-
Zheng, Q., Li, X., Azgin, A.: Clks: Certificateless keyword search on encrypted data. Cryptology ePrint Archive, Report 2015/814 (2015). http://eprint.iacr.org/
-
(2015)
Clks: Certificateless keyword search on encrypted data
-
-
Zheng, Q.1
Li, X.2
Azgin, A.3
-
36
-
-
80052165941
-
Peksrand: Providing predicate privacy in public-key encryption with keyword search
-
Kyoto, Japan, June 5-9, 2011
-
Zhu, B., Zhu B., Ren, K.: Peksrand: providing predicate privacy in public-key encryption with keyword search. In: Proceedings of IEEE International Conference on Communications, ICC 2011, Kyoto, Japan, June 5-9, 2011, pp. 1-6 (2011)
-
(2011)
Proceedings of IEEE International Conference on Communications, ICC 2011
, pp. 1-6
-
-
Zhu, B.1
Zhu, B.2
Ren, K.3
|