Applied Cryptography and Network Security
From MaRDI portal
Publication:4680960
DOI10.1007/B98360zbMATH Open1103.68514OpenAlexW4301861138MaRDI QIDQ4680960FDOQ4680960
Authors: Philippe Golle, Jessica N. Staddon, Brent Waters
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Recommendations
- Information and Communications Security
- Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups
- Privacy Preserving Keyword Searches on Remote Encrypted Data
- Advances in Cryptology - EUROCRYPT 2004
- Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (46)
- Towards Robust Computation on Encrypted Data
- Encapsulated search index: public-key, sub-linear, distributed, and delegatable
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Attribute-based keyword search from lattices
- Advances in Cryptology - EUROCRYPT 2004
- Privacy Preserving Keyword Searches on Remote Encrypted Data
- Integrity preserving multi-keyword searchable encryption for cloud computing
- Providing data confidentiality against malicious hosts in shared data spaces
- A query privacy-enhanced and secure search scheme over encrypted data in cloud computing
- Public Key Encryption That Allows PIR Queries
- Structured encryption for conceptual graphs
- Fuzzy matching: multi-authority attribute searchable encryption without central authority
- Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System
- Dynamic multi-client searchable symmetric encryption with support for Boolean queries
- Oblivious keyword search with authorization
- Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption
- Publicly verifiable searchable symmetric encryption based on efficient cryptographic components
- Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data
- An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
- Forward and backward secure keyword search with flexible keyword shielding
- Structured encryption for knowledge graphs
- Efficient no-dictionary verifiable searchable symmetric encryption
- Public key encryption with temporary and fuzzy keyword search
- Building a dynamic searchable encrypted medical database for multi-client
- Towards efficient verifiable conjunctive keyword search for large encrypted database
- Expressive attribute-based keyword search with constant-size ciphertext
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
- Information and Communications Security
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries
- Threshold Privacy Preserving Keyword Searches
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
- Public-key authenticated encryption with keyword search revisited: security model and constructions
- Data and Applications Security XIX
- Dual trapdoor identity-based encryption with keyword search
- Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation
- Forward private searchable encryption with conjunctive keywords query
- Oblivious keyword search
- Public key authenticated searchable encryption against frequency analysis attacks
- Passive query-recovery attack against secure conjunctive keyword search schemes
- Certificateless conjunctive keyword search on encrypted data in cloud storage
- Information and Communications Security
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680960)