Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
From MaRDI portal
Publication:5451027
Recommendations
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Perfect keyword privacy in PEKS systems
- Robust encryption
- Generic constructions of integrated PKE and PEKS
- Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data
Cited in
(57)- ID-based public key cryptographic systems
- Statistically consistent broadcast authenticated encryption with keyword search. Adaptive security from standard assumptions
- Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions
- Public key authenticated searchable encryption against frequency analysis attacks
- Identity-based matchmaking encryption without random oracles
- Public Key Encryption with Authorized Keyword Search
- Oblivious keyword search with authorization
- Practical Identity-Based Encryption Without Random Oracles
- Encapsulated search index: public-key, sub-linear, distributed, and delegatable
- Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting
- Fully secure functional encryption for inner products, from standard assumptions
- Anonymous, robust post-quantum public key encryption
- Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Verifiable Inner Product Encryption Scheme
- A new general framework for secure public key encryption with keyword search
- Public-Key Encryption with Delegated Search
- Secure hybrid encryption in the standard model from hard learning problems
- An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
- New Anonymity Notions for Identity-Based Encryption
- Efficient and universally composable single secret leader election from pairings
- Anonymous HIBE with short ciphertexts: full security in prime order groups
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
- Lattice trapdoors and IBE from middle-product LWE
- Building Key-Private Public-Key Encryption Schemes
- On the Anonymization of Cocks IBE Scheme
- Novel updatable identity-based hash proof system and its applications
- Revocable hierarchical identity-based encryption with adaptive security
- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Improved hidden vector encryption with short ciphertexts and tokens
- Inner-product encryption under standard assumptions
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Generalized Identity Based and Broadcast Encryption Schemes
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Proxy re-encryption with keyword search
- On the Security of a Searchable Anonymous Attribute Based Encryption
- Generic construction of designated tester public-key encryption with keyword search
- Generic anonymous identity-based broadcast encryption with chosen-ciphertext security
- Key-oblivious encryption from isogenies with application to accountable tracing signatures
- Public-key authenticated encryption with keyword search revisited: security model and constructions
- Hierarchical identity-based encryption with tight multi-challenge security
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Short Integrated PKE+PEKS in Standard Model
- Trapdoor privacy in asymmetric searchable encryption schemes
- Functional encryption for set intersection in the multi-client setting
- Multi-use deterministic public key proxy re-encryption from lattices in the auxiliary-input setting
- An efficient IBE scheme with tight security reduction in the random oracle model
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- Implementing secure reporting of sexual misconduct -- revisiting WhoToo
- Robust encryption
- Dual trapdoor identity-based encryption with keyword search
- Public key encryption with hierarchical authorized keyword search
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems
- Anonymity of NIST PQC round 3 KEMs
- New Anonymity Notions for Identity-Based Encryption
This page was built for publication: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451027)