Threshold Privacy Preserving Keyword Searches
From MaRDI portal
Publication:5448684
DOI10.1007/978-3-540-77566-9_56zbMATH Open1132.68378OpenAlexW1955224561WikidataQ62559366 ScholiaQ62559366MaRDI QIDQ5448684FDOQ5448684
Authors: Peishun Wang, Huaxiong Wang, Josef Pieprzyk
Publication date: 7 March 2008
Published in: SOFSEM 2008: Theory and Practice of Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77566-9_56
Recommendations
- Privacy Preserving Keyword Searches on Remote Encrypted Data
- A privacy-preserving multi-keyword search approach in cloud computing
- Threshold broadcast encryption with keyword search
- Applied Cryptography and Network Security
- Forward and backward secure keyword search with flexible keyword shielding
- Information and Communications Security
Cites Work
- Conjunctive, Subset, and Range Queries on Encrypted Data
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- ID-Based Blind Signature and Ring Signature from Pairings
- Applied Cryptography and Network Security
Cited In (6)
- Public key encryption with distributed keyword search
- Threshold broadcast encryption with keyword search
- Theory of Cryptography
- Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups
- LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search
- Extensions of IBE and related primitives
This page was built for publication: Threshold Privacy Preserving Keyword Searches
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5448684)