Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
From MaRDI portal
Publication:1021236
DOI10.1007/s00145-007-9006-6zbMath1161.94378OpenAlexW2108343866WikidataQ59163750 ScholiaQ59163750MaRDI QIDQ1021236
Michel Abdalla, Dario Catalano, John Malone-Lee, Pascal Paillier, Eike Kiltz, Tanja Lange, Mihir Bellare, Tadayoshi Kohno, Haixia Shi, Gregory Neven
Publication date: 8 June 2009
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-007-9006-6
Related Items
Predicate encryption supporting disjunctions, polynomial equations, and inner products, Group-Based Source-Destination Verifiable Encryption with Blacklist Checking, Trapdoors for Ideal Lattices with Applications, Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation, Anonymous IBE, leakage resilience and circular security from new assumptions, Towards Forward Security Properties for PEKS and IBE, Public key encryption with equality test in the standard model, Anonymous and leakage resilient IBE and IPE, Bonsai trees, or how to delegate a lattice basis, Public Key Encryption with Flexible Pattern Matching, Pattern matching in encrypted stream from inner product encryption, Efficient Asymmetric Index Encapsulation Scheme for Named Data, Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey, Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation, Identity-based matchmaking encryption from standard assumptions, A Generic Construction of Integrated Secure-Channel Free PEKS and PKE, A generic construction of CCA-secure attribute-based encryption with equality test, Relations between semantic security and anonymity in identity-based encryption, Public key encryption with equality test from generic assumptions in the random oracle model, The relation and transformation between hierarchical inner product encryption and spatial encryption, An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme, Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity, Identity-based encryption with outsourced equality test in cloud computing, Robust encryption, Functional Encryption: Origins and Recent Developments, Robust Encryption, Revisited, Fuzzy matching: multi-authority attribute searchable encryption without central authority, Generic construction of designated tester public-key encryption with keyword search, Generic constructions of integrated PKE and PEKS, Semi-generic construction of public key encryption and identity-based encryption with equality test, Linear Encryption with Keyword Search, Identity-based encryption with security against the KGC: a formal model and its instantiations, Robust Encryption, A generic scheme of plaintext-checkable database encryption
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Identity-Based Cryptosystems and Signature Schemes
- Practical Identity-Based Encryption Without Random Oracles
- Hierarchical ID-Based Cryptography
- Applied Cryptography and Network Security
- Identity-Based Encryption from the Weil Pairing
- Foundations of Cryptography
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)