Conjunctive, Subset, and Range Queries on Encrypted Data

From MaRDI portal
Publication:3596399

DOI10.1007/978-3-540-70936-7_29zbMath1156.94335OpenAlexW1589843374MaRDI QIDQ3596399

Dan Boneh, Brent Waters

Publication date: 30 August 2007

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-70936-7_29



Related Items

Public Key Encryption with Flexible Pattern Matching, Multi-input non-interactive functional encryption: constructions and applications, Multi-key and multi-input predicate encryption from learning with errors, Pattern matching in encrypted stream from inner product encryption, (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin, M-EDESE: multi-domain, easily deployable, and efficiently searchable encryption, Multi-input quadratic functional encryption: stronger security, broader functionality, Public key authenticated searchable encryption against frequency analysis attacks, Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting, Attribute-based signatures for range of inner product and its applications, Multi-input attribute based encryption and predicate encryption, An Almost Non-interactive Order Preserving Encryption Scheme, Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits, A survey on functional encryption, Spatial encryption revisited: from delegatable multiple inner product encryption and more, Achieving privacy-preserving sensitive attributes for large universe based on private set intersection, Complementary set encryption for privacy-preserving data consolidation, Self-updatable encryption with short public parameters and its extensions, Attribute-Based Keyword Search from Lattices, Verifiable Inner Product Encryption Scheme, A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials, Impossibility of simulation secure functional encryption even with random oracles, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Predicate Encryption for Circuits from LWE, A Punctured Programming Approach to Adaptively Secure Functional Encryption, Simpler constructions of asymmetric primitives from obfuscation, Towards Forward Security Properties for PEKS and IBE, Research on quantum authentication methods for the secure access control among three elements of cloud computing, Decentralized policy-hiding ABE with receiver privacy, Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption, Dynamic collusion bounded functional encryption from identity-based encryption, Efficient revocable identity-based encryption via subset difference methods, A query privacy-enhanced and secure search scheme over encrypted data in cloud computing, Efficient request-based comparable encryption scheme based on sliding window method, Public-key authenticated encryption with keyword search revisited: security model and constructions, On the power of rewinding simulators in functional encryption, Anonymous and leakage resilient IBE and IPE, Predicate encryption from bilinear maps and one-sided probabilistic rank, Attribute based encryption for deterministic finite automata from DLIN, Reconciling non-malleability with homomorphic encryption, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, Blind key-generation attribute-based encryption for general predicates, A survey on design and implementation of protected searchable data in the cloud, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Oblivious Keyword Search with Authorization, Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures, Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation, Expressive query over outsourced encrypted data, Relations between semantic security and anonymity in identity-based encryption, Inner-product encryption under standard assumptions, Improved hidden vector encryption with short ciphertexts and tokens, Finding composite order ordinary elliptic curves using the Cocks-Pinch method, Adaptively secure inner product encryption from LWE, Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions, Privacy-preserving pattern matching on encrypted data, Decentralized multi-client functional encryption for set intersection with improved efficiency, Multi-party functional encryption, Policy-compliant signatures, Public key encryption with fuzzy matching, Fully secure unbounded zero inner product encryption with short ciphertexts and keys, Direct computation of branching programs and its applications to more efficient lattice-based cryptography, Adaptively simulation-secure attribute-hiding predicate encryption, Improved inner-product encryption with adaptive security and full attribute-hiding, Achieving IND-CCA Security for Functional Encryption for Inner Products, Effective error-tolerant keyword search for secure cloud computing, The relation and transformation between hierarchical inner product encryption and spatial encryption, Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups, Multidimensional segment trees can do range updates in poly-logarithmic time, Functional broadcast encryption with applications to data sharing for cloud storage, Compact (Targeted Homomorphic) Inner Product Encryption from LWE, Compact Inner Product Encryption from LWE, Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems, Public key encryption with filtered equality test revisited, Secure deduplication storage systems supporting keyword search, Public key encryption with keyword search secure against keyword guessing attacks without random oracle, Public-Key Encryption with Delegated Search, Minimizing locality of one-way functions via semi-private randomized encodings, Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Computational friendly attribute-based encryptions with short ciphertext, Identity-based encryption with outsourced equality test in cloud computing, Robust encryption, Functional Encryption: Origins and Recent Developments, Improved (Hierarchical) Inner-Product Encryption from Lattices, Robust Encryption, Revisited, Anonymous HIBE with short ciphertexts: full security in prime order groups, Private Puncturable PRFs from Standard Lattice Assumptions, Simplifying Design and Analysis of Complex Predicate Encryption Schemes, Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions, Cryptography with Updates, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Generic construction of designated tester public-key encryption with keyword search, Proxy re-encryption with keyword search, Generalized Identity Based and Broadcast Encryption Schemes, Hidden-Vector Encryption with Groups of Prime Order, Unnamed Item, Watermarking cryptographic functionalities from standard lattice assumptions, Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis, Threshold Privacy Preserving Keyword Searches, A Study of Pair Encodings: Predicate Encryption in Prime Order Groups, Generic constructions of integrated PKE and PEKS, Multi-input Functional Encryption and Its Application in Outsourcing Computation, A multi-authority approach to various predicate encryption types, Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing, Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms, Order-Preserving Symmetric Encryption, Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits, Secure and Traceable Framework for Data Circulation, Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance, Public Key Encryption with Authorized Keyword Search, Non-interactive anonymous router, Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption, Using abelian varieties to improve pairing-based cryptography, Privacy-Aware Attribute-Based Encryption with User Accountability, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, New Anonymity Notions for Identity-Based Encryption, Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups