Deterministic and Efficiently Searchable Encryption

From MaRDI portal
Publication:3612569

DOI10.1007/978-3-540-74143-5_30zbMath1215.94032OpenAlexW1502927489MaRDI QIDQ3612569

Adam O'Neill, Alexandra Boldyreva, Mihir Bellare

Publication date: 10 March 2009

Published in: Advances in Cryptology - CRYPTO 2007 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-74143-5_30




Related Items (64)

Non-malleable functions and their applicationsPlaintext-Checkable EncryptionWitness authenticating NIZKs and applicationsApproximate-Deterministic Public Key Encryption from Hard Learning ProblemsReproducible Circularly-Secure Bit Encryption: Applications and RealizationsEncrypted key-value storesA privacy-preserving multi-keyword search approach in cloud computingAnother step towards realizing random oracles: non-malleable point obfuscationTowards Forward Security Properties for PEKS and IBEEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelEfficient cryptosystems from \(2^k\)-th power residue symbolsEfficient request-based comparable encryption scheme based on sliding window methodPublic key encryption with equality test in the standard modelInstantiability of RSA-OAEP under chosen-plaintext attackUpdatable all-but-one dual projective hashing and its applicationsSelective-Opening Security in the Presence of Randomness FailuresEfficient Asymmetric Index Encapsulation Scheme for Named DataThreshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)Approximate distance-comparison-preserving symmetric encryptionHow to build a trapdoor function from an encryption schemeEfficient Boolean search over encrypted data with reduced leakageEfficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric EncryptionAugmented random oraclesTo label, or not to label (in generic groups)Beyond Uber: instantiating generic groups via PGGsInstantiability of classical random-oracle-model encryption transformsReproducible circularly secure bit encryption: applications and realizationsPrivacy-preserving pattern matching on encrypted dataFull Disk Encryption: Bridging Theory and PracticeOn the impossibility of structure-preserving deterministic primitivesLossy Key Encapsulation Mechanism and Its ApplicationsTowards Tightly Secure Deterministic Public Key EncryptionSecure deduplication storage systems supporting keyword searchDATA STORAGE SECURITY AND FULL DISK ENCRYPTIONIncremental deterministic public-key encryptionProcessing secure, verifiable and efficient SQL over outsourced databaseDeterministic public-key encryption for adaptively-chosen plaintext distributionsFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsA generic construction of CCA-secure deterministic encryptionObfuscation for cryptographic purposesProxy re-encryption with keyword searchOn Notions of Security for Deterministic Encryption, and Efficient Constructions without Random OraclesDeterministic Encryption: Definitional Equivalences and Constructions without Random OraclesPoint-Function Obfuscation: A Framework and Generic ConstructionsA unified approach to deterministic encryption: new constructions and a connection to computational entropySemi-generic construction of public key encryption and identity-based encryption with equality testCCA security and trapdoor functions via key-dependent-message securityOrder-Preserving Symmetric EncryptionBetter security for deterministic public-key encryption: the auxiliary-input settingCCA-security from adaptive all-but-one lossy trapdoor functionsDMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User RevocationVerifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing StorageGeneric authenticated key exchange in the quantum random oracle modelDeterministic Public-Key Encryption Under Continual LeakageAdversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup ModuliCiphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user SettingBackdoors in Pseudorandom Number Generators: Possibility and Impossibility ResultsTwo Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated InputsA generic scheme of plaintext-checkable database encryptionUpdatable Tokenization: Formal Definitions and Provably Secure ConstructionsIndifferentiability for public key cryptosystemsLower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe modelMulti-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input SettingBoolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity






This page was built for publication: Deterministic and Efficiently Searchable Encryption