Applied Cryptography and Network Security

From MaRDI portal
Publication:4680960

DOI10.1007/b98360zbMath1103.68514OpenAlexW4301861138MaRDI QIDQ4680960

Jessica N. Staddon, Brent Waters, Philippe Golle

Publication date: 13 June 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b98360




Related Items (29)

Attribute-Based Keyword Search from LatticesRanked Searchable Symmetric Encryption Supporting Conjunctive QueriesPublic key encryption with temporary and fuzzy keyword searchDynamic multi-client searchable symmetric encryption with support for Boolean queriesTowards efficient verifiable conjunctive keyword search for large encrypted databaseSomewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryptionA query privacy-enhanced and secure search scheme over encrypted data in cloud computingPublic-key encryption for protecting data in cloud system with intelligent agents against side-channel attacksPublic-key authenticated encryption with keyword search revisited: security model and constructionsBuilding a dynamic searchable encrypted medical database for multi-clientIntegrity Preserving Multi-keyword Searchable Encryption for Cloud ComputingPublic key authenticated searchable encryption against frequency analysis attacksSecure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementationStructured encryption for knowledge graphsDual trapdoor identity-based encryption with keyword searchPublic key encryption with keyword search secure against keyword guessing attacks without random oraclePublicly verifiable searchable symmetric encryption based on efficient cryptographic componentsChosen-ciphertext secure anonymous conditional proxy re-encryption with keyword searchFuzzy matching: multi-authority attribute searchable encryption without central authorityTowards Robust Computation on Encrypted DataThreshold Privacy Preserving Keyword SearchesPublic Key Encryption with Searchable Keywords Based on Jacobi SymbolsExpressive attribute-based keyword search with constant-size ciphertextAn efficient public-key searchable encryption scheme secure against inside keyword guessing attacksEnabling efficient and verifiable multi-keyword ranked search over encrypted cloud dataSearchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensionsKeyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic GroupsEfficient No-dictionary Verifiable Searchable Symmetric EncryptionPassive query-recovery attack against secure conjunctive keyword search schemes




This page was built for publication: Applied Cryptography and Network Security