Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

From MaRDI portal
Revision as of 10:26, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5451027

DOI10.1007/11535218_13zbMath1145.94430OpenAlexW2120976781WikidataQ59163782 ScholiaQ59163782MaRDI QIDQ5451027

Haixia Shi, Gregory Neven, John Malone-Lee, Dario Catalano, Michel Abdalla, Tanja Lange, Eike Kiltz, Pascal Paillier, Tadayoshi Kohno, Mihir Bellare

Publication date: 17 March 2008

Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11535218_13




Related Items (51)

An efficient IBE scheme with tight security reduction in the random oracle modelVerifiable Inner Product Encryption SchemeHierarchical Identity-Based Encryption with Tight Multi-challenge SecurityAn efficient and secure searchable public key encryption scheme with privacy protection for cloud storageEfficient subtree-based encryption for fuzzy-entity data sharingShort Integrated PKE+PEKS in Standard ModelImplementing secure reporting of sexual misconduct -- revisiting WhoTooA New General Framework for Secure Public Key Encryption with Keyword SearchAnonymous, robust post-quantum public key encryptionAnonymity of NIST PQC round 3 KEMsPublic-key authenticated encryption with keyword search revisited: security model and constructionsLattice trapdoors and IBE from middle-product LWETightly CCA-secure identity-based encryption with ciphertext pseudorandomnessOn the Anonymization of Cocks IBE SchemeEfficient and universally composable single secret leader election from pairingsOblivious Keyword Search with AuthorizationEncapsulated search index: public-key, sub-linear, distributed, and delegatablePublic key authenticated searchable encryption against frequency analysis attacksKey-oblivious encryption from isogenies with application to accountable tracing signaturesIdentity-based matchmaking encryption without random oraclesPublic key encryption with hierarchical authorized keyword searchInner-product encryption under standard assumptionsImproved hidden vector encryption with short ciphertexts and tokensDual trapdoor identity-based encryption with keyword searchReflections on the security proofs of Boneh-Franklin identity-based encryption schemeEfficient identity-based broadcast encryption with keyword search against insider attacks for database systemsPublic key encryption with keyword search secure against keyword guessing attacks without random oraclePublic-Key Encryption with Delegated SearchMobile access and flexible search over encrypted cloud data in heterogeneous systemsAnonymous HIBE with short ciphertexts: full security in prime order groupsPractical Identity-Based Encryption Without Random OraclesProxy re-encryption with keyword searchGeneralized Identity Based and Broadcast Encryption SchemesSecurity and Anonymity of Identity-Based Encryption with Multiple Trusted AuthoritiesID-based public key cryptographic systemsNovel updatable identity-based hash proof system and its applicationsPublic Key Encryption with Searchable Keywords Based on Jacobi SymbolsCCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric EncryptionRevocable hierarchical identity-based encryption with adaptive securityUniversally Anonymous IBE Based on the Quadratic Residuosity AssumptionPublic Key Encryption with Authorized Keyword SearchGeneric Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext SecurityBuilding Key-Private Public-Key Encryption SchemesSearchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensionsFully Secure Functional Encryption for Inner Products, from Standard AssumptionsFunctional encryption for set intersection in the multi-client settingNew Anonymity Notions for Identity-Based EncryptionCiphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user SettingNew Anonymity Notions for Identity-Based EncryptionMulti-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input SettingSecure hybrid encryption in the standard model from hard learning problems







This page was built for publication: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions