Advances in Cryptology - EUROCRYPT 2004

From MaRDI portal
Publication:5307272


DOI10.1007/b97182zbMath1122.68424WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307272

Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano, Dan Boneh

Publication date: 25 September 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b97182


94A60: Cryptography

68P25: Data encryption (aspects in computer science)


Related Items

An efficient IBE scheme with tight security reduction in the random oracle model, Relations between robustness and RKA security under public-key encryption, Cooperative private searching in clouds, Effective error-tolerant keyword search for secure cloud computing, Secure deduplication storage systems supporting keyword search, On security against the server in designated tester public key encryption with keyword search, Public key encryption with keyword search secure against keyword guessing attacks without random oracle, Searchable symmetric encryption over multiple servers, Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search, Generic construction of designated tester public-key encryption with keyword search, A generic scheme of plaintext-checkable database encryption, Implementing optimized pairings with elliptic nets, Proxy re-encryption with keyword search, Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions, Some basics on privacy techniques, anonymization and their big data challenges, An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage, Anonymous IBE, leakage resilience and circular security from new assumptions, A novel model for lattice-based authorized searchable encryption with special keyword, A survey on design and implementation of protected searchable data in the cloud, Timed-release computational secret sharing and threshold encryption, Dual trapdoor identity-based encryption with keyword search, Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems, Identity-based encryption with outsourced equality test in cloud computing, Robust encryption, Expressive attribute-based keyword search with constant-size ciphertext, Bonsai trees, or how to delegate a lattice basis, Relations between semantic security and anonymity in identity-based encryption, Mobile access and flexible search over encrypted cloud data in heterogeneous systems, Fuzzy matching: multi-authority attribute searchable encryption without central authority, Plaintext checkable encryption with designated checker, Functional encryption for set intersection in the multi-client setting, Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model, A comparative study of dictionary matching with gaps: limitations, techniques and challenges, A secure searchable encryption scheme for cloud using hash-based indexing, A privacy-preserving multi-keyword search approach in cloud computing, Public key encryption with temporary and fuzzy keyword search, Lattice-based public-key encryption with equality test supporting flexible authorization in standard model, Efficient schemes for committing authenticated encryption, Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation, Witness-based searchable encryption, Expressive query over outsourced encrypted data, Certificateless public key encryption with equality test, CPP: towards comprehensive privacy preserving for query processing in information networks, Online parameterized dictionary matching with one gap, Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage, Public key encryption with equality test from generic assumptions in the random oracle model, FSSE: forward secure searchable encryption with keyed-block chains, EPiC: efficient privacy-preserving counting for MapReduce, Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity, Secure and efficient delegation of elliptic-curve pairing, Public key encryption with filtered equality test revisited, Anonymous HIBE with short ciphertexts: full security in prime order groups, Novel updatable identity-based hash proof system and its applications, On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography, Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms, Semi-order preserving encryption, Semi-generic construction of public key encryption and identity-based encryption with equality test, Deniable searchable symmetric encryption, An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks, Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data, Public key encryption with equality test via hash proof system, Towards secure data retrieval for multi-tenant architecture using attribute-based key word search, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption, A query privacy-enhanced and secure search scheme over encrypted data in cloud computing, Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness, Inner-product encryption under standard assumptions, Improved hidden vector encryption with short ciphertexts and tokens, Fully homomorphic SIMD operations, The relation and transformation between hierarchical inner product encryption and spatial encryption, An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services, Group public key encryption with equality test against offline message recovery attack, Public key encryption with equality test in the standard model, Public-key authenticated encryption with keyword search revisited: security model and constructions, Building a dynamic searchable encrypted medical database for multi-client, Public key based searchable encryption with fine-grained sender permission control, Improved security model for public-key authenticated encryption with keyword search, Public key encryption with fuzzy matching, Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits, Secure and Traceable Framework for Data Circulation, Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage, Public Key Encryption with Authorized Keyword Search, Linear Encryption with Keyword Search, Bounded Size-Hiding Private Set Intersection, Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Plaintext-Checkable Encryption, Oblivious Keyword Search with Authorization, Efficient Asymmetric Index Encapsulation Scheme for Named Data, Low-Leakage Secure Search for Boolean Expressions, Achieving IND-CCA Security for Functional Encryption for Inner Products, Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups, Public-Key Encryption with Delegated Search, An Analysis of Affine Coordinates for Pairing Computation, Towards Restricting Plaintext Space in Public Key Encryption, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, On the Efficient Implementation of Pairing-Based Protocols, Heuristic counting of Kachisa-Schaefer-Scott curves, A New General Framework for Secure Public Key Encryption with Keyword Search, Towards Forward Security Properties for PEKS and IBE, Robust Encryption, Functional Encryption: Origins and Recent Developments, Robust Encryption, Revisited, A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model, Attribute-Based Keyword Search from Lattices, Verifiable Inner Product Encryption Scheme, Extensions of IBE and Related Primitives, Short Integrated PKE+PEKS in Standard Model, Verifiable Range Query Processing for Cloud Computing, Public key encryption with distributed keyword search, Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme, Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks, Verifiable Stream Computation and Arthur--Merlin Communication, Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity, An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme, Blind Identity-Based Encryption and Simulatable Oblivious Transfer, Threshold Privacy Preserving Keyword Searches, Public Key Encryption with Searchable Keywords Based on Jacobi Symbols, Generic constructions of integrated PKE and PEKS, Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting, Privacy-Preserving Queries on Encrypted Data, Public Key Encryption with Flexible Pattern Matching, Quantum attribute-based encryption: a comprehensive study, LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search, Efficient and universally composable single secret leader election from pairings, Pattern matching in encrypted stream from inner product encryption, Security-enhanced public-key authenticated searchable encryption, Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey, M-EDESE: multi-domain, easily deployable, and efficiently searchable encryption, Encapsulated search index: public-key, sub-linear, distributed, and delegatable, Public key authenticated searchable encryption against frequency analysis attacks, How to compress encrypted data, Efficient Boolean search over encrypted data with reduced leakage, A Generic Construction of Integrated Secure-Channel Free PEKS and PKE, Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption, A survey on functional encryption, A generic construction of CCA-secure attribute-based encryption with equality test, Generic construction of trace-and-revoke inner product functional encryption, Public key authenticated encryption with keyword search from LWE, Public key encryption with hierarchical authorized keyword search, Limits of breach-resistant and snapshot-oblivious RAMs, Searchable encryption with randomized ciphertext and randomized keyword search, Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis, Practical Identity-Based Encryption Without Random Oracles, Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles, Towards Robust Computation on Encrypted Data, Pairings in Trusted Computing, Hidden-Vector Encryption with Groups of Prime Order, Faster Implementation of η T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition, Universally Anonymous IBE Based on the Quadratic Residuosity Assumption