Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
DOI10.1007/11535218_13zbMATH Open1145.94430OpenAlexW2120976781WikidataQ59163782 ScholiaQ59163782MaRDI QIDQ5451027FDOQ5451027
Haixia Shi, Gregory Neven, John Malone-Lee, Dario Catalano, Michel Abdalla, Tanja Lange, Eike Kiltz, Pascal Paillier, Tadayoshi Kohno, M. Bellare
Publication date: 17 March 2008
Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11535218_13
Recommendations
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Perfect keyword privacy in PEKS systems
- Robust encryption
- Generic constructions of integrated PKE and PEKS
- Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (53)
- Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
- Hierarchical Identity-Based Encryption with Tight Multi-challenge Security
- Encapsulated search index: public-key, sub-linear, distributed, and delegatable
- An efficient IBE scheme with tight security reduction in the random oracle model
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
- Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
- Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems
- Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting
- A New General Framework for Secure Public Key Encryption with Keyword Search
- An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
- Verifiable Inner Product Encryption Scheme
- Improved hidden vector encryption with short ciphertexts and tokens
- Inner-product encryption under standard assumptions
- On the Security of a Searchable Anonymous Attribute Based Encryption
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Revocable hierarchical identity-based encryption with adaptive security
- New Anonymity Notions for Identity-Based Encryption
- On the Anonymization of Cocks IBE Scheme
- Short Integrated PKE+PEKS in Standard Model
- Building Key-Private Public-Key Encryption Schemes
- Key-oblivious encryption from isogenies with application to accountable tracing signatures
- Public key encryption with hierarchical authorized keyword search
- Implementing secure reporting of sexual misconduct -- revisiting WhoToo
- Anonymous, robust post-quantum public key encryption
- Efficient and universally composable single secret leader election from pairings
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
- Identity-based matchmaking encryption without random oracles
- Oblivious Keyword Search with Authorization
- Novel updatable identity-based hash proof system and its applications
- Secure hybrid encryption in the standard model from hard learning problems
- Public-Key Encryption with Delegated Search
- Anonymity of NIST PQC round 3 KEMs
- Lattice trapdoors and IBE from middle-product LWE
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Public Key Encryption with Authorized Keyword Search
- Functional encryption for set intersection in the multi-client setting
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Practical Identity-Based Encryption Without Random Oracles
- Anonymous HIBE with short ciphertexts: full security in prime order groups
- Generalized Identity Based and Broadcast Encryption Schemes
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
- Public-key authenticated encryption with keyword search revisited: security model and constructions
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Proxy re-encryption with keyword search
- Dual trapdoor identity-based encryption with keyword search
- New Anonymity Notions for Identity-Based Encryption
- Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions
- ID-based public key cryptographic systems
- Public key authenticated searchable encryption against frequency analysis attacks
This page was built for publication: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451027)