Applied Cryptography and Network Security
From MaRDI portal
Publication:4680960
DOI10.1007/b98360zbMath1103.68514OpenAlexW4301861138MaRDI QIDQ4680960
Jessica N. Staddon, Brent Waters, Philippe Golle
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (29)
Attribute-Based Keyword Search from Lattices ⋮ Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries ⋮ Public key encryption with temporary and fuzzy keyword search ⋮ Dynamic multi-client searchable symmetric encryption with support for Boolean queries ⋮ Towards efficient verifiable conjunctive keyword search for large encrypted database ⋮ Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption ⋮ A query privacy-enhanced and secure search scheme over encrypted data in cloud computing ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ Public-key authenticated encryption with keyword search revisited: security model and constructions ⋮ Building a dynamic searchable encrypted medical database for multi-client ⋮ Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing ⋮ Public key authenticated searchable encryption against frequency analysis attacks ⋮ Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation ⋮ Structured encryption for knowledge graphs ⋮ Dual trapdoor identity-based encryption with keyword search ⋮ Public key encryption with keyword search secure against keyword guessing attacks without random oracle ⋮ Publicly verifiable searchable symmetric encryption based on efficient cryptographic components ⋮ Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search ⋮ Fuzzy matching: multi-authority attribute searchable encryption without central authority ⋮ Towards Robust Computation on Encrypted Data ⋮ Threshold Privacy Preserving Keyword Searches ⋮ Public Key Encryption with Searchable Keywords Based on Jacobi Symbols ⋮ Expressive attribute-based keyword search with constant-size ciphertext ⋮ An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks ⋮ Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data ⋮ Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions ⋮ Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups ⋮ Efficient No-dictionary Verifiable Searchable Symmetric Encryption ⋮ Passive query-recovery attack against secure conjunctive keyword search schemes
This page was built for publication: Applied Cryptography and Network Security