Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
DOI10.1007/11535218_13zbMATH Open1145.94430OpenAlexW2120976781WikidataQ59163782 ScholiaQ59163782MaRDI QIDQ5451027FDOQ5451027
Authors: Michel Abdalla, M. Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi
Publication date: 17 March 2008
Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11535218_13
Recommendations
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Perfect keyword privacy in PEKS systems
- Robust encryption
- Generic constructions of integrated PKE and PEKS
- Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (57)
- Identity-based matchmaking encryption without random oracles
- Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions
- ID-based public key cryptographic systems
- Statistically consistent broadcast authenticated encryption with keyword search. Adaptive security from standard assumptions
- Public key authenticated searchable encryption against frequency analysis attacks
- Encapsulated search index: public-key, sub-linear, distributed, and delegatable
- An efficient IBE scheme with tight security reduction in the random oracle model
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
- Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems
- Oblivious keyword search with authorization
- Fully secure functional encryption for inner products, from standard assumptions
- An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
- Robust encryption
- Verifiable Inner Product Encryption Scheme
- Improved hidden vector encryption with short ciphertexts and tokens
- Inner-product encryption under standard assumptions
- On the Security of a Searchable Anonymous Attribute Based Encryption
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Trapdoor privacy in asymmetric searchable encryption schemes
- Revocable hierarchical identity-based encryption with adaptive security
- New Anonymity Notions for Identity-Based Encryption
- On the Anonymization of Cocks IBE Scheme
- Short Integrated PKE+PEKS in Standard Model
- Building Key-Private Public-Key Encryption Schemes
- Key-oblivious encryption from isogenies with application to accountable tracing signatures
- Hierarchical identity-based encryption with tight multi-challenge security
- Multi-use deterministic public key proxy re-encryption from lattices in the auxiliary-input setting
- Public key encryption with hierarchical authorized keyword search
- Implementing secure reporting of sexual misconduct -- revisiting WhoToo
- Anonymous, robust post-quantum public key encryption
- Efficient and universally composable single secret leader election from pairings
- Novel updatable identity-based hash proof system and its applications
- Secure hybrid encryption in the standard model from hard learning problems
- Public-Key Encryption with Delegated Search
- Anonymity of NIST PQC round 3 KEMs
- Lattice trapdoors and IBE from middle-product LWE
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Public Key Encryption with Authorized Keyword Search
- Functional encryption for set intersection in the multi-client setting
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Practical Identity-Based Encryption Without Random Oracles
- Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting
- Anonymous HIBE with short ciphertexts: full security in prime order groups
- Generalized Identity Based and Broadcast Encryption Schemes
- Generic anonymous identity-based broadcast encryption with chosen-ciphertext security
- Generic construction of designated tester public-key encryption with keyword search
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
- Public-key authenticated encryption with keyword search revisited: security model and constructions
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Proxy re-encryption with keyword search
- Dual trapdoor identity-based encryption with keyword search
- New Anonymity Notions for Identity-Based Encryption
- A new general framework for secure public key encryption with keyword search
This page was built for publication: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451027)