Applied Cryptography and Network Security

From MaRDI portal
Publication:4680960


DOI10.1007/b98360zbMath1103.68514OpenAlexW4301861138MaRDI QIDQ4680960

Jessica N. Staddon, Brent Waters, Philippe Golle

Publication date: 13 June 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b98360



Related Items

Attribute-Based Keyword Search from Lattices, Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries, Public key encryption with temporary and fuzzy keyword search, Dynamic multi-client searchable symmetric encryption with support for Boolean queries, Towards efficient verifiable conjunctive keyword search for large encrypted database, Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption, A query privacy-enhanced and secure search scheme over encrypted data in cloud computing, Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks, Public-key authenticated encryption with keyword search revisited: security model and constructions, Building a dynamic searchable encrypted medical database for multi-client, Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing, Public key authenticated searchable encryption against frequency analysis attacks, Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation, Structured encryption for knowledge graphs, Dual trapdoor identity-based encryption with keyword search, Public key encryption with keyword search secure against keyword guessing attacks without random oracle, Publicly verifiable searchable symmetric encryption based on efficient cryptographic components, Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search, Fuzzy matching: multi-authority attribute searchable encryption without central authority, Towards Robust Computation on Encrypted Data, Threshold Privacy Preserving Keyword Searches, Public Key Encryption with Searchable Keywords Based on Jacobi Symbols, Expressive attribute-based keyword search with constant-size ciphertext, An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks, Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data, Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions, Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups, Efficient No-dictionary Verifiable Searchable Symmetric Encryption, Passive query-recovery attack against secure conjunctive keyword search schemes