Pages that link to "Item:Q5451027"
From MaRDI portal
The following pages link to Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions (Q5451027):
Displaying 45 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle (Q497143) (← links)
- Proxy re-encryption with keyword search (Q985079) (← links)
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions (Q1021236) (← links)
- An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage (Q1626271) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- Dual trapdoor identity-based encryption with keyword search (Q1701741) (← links)
- Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems (Q1733051) (← links)
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems (Q1998999) (← links)
- Revocable hierarchical identity-based encryption with adaptive security (Q2043020) (← links)
- Functional encryption for set intersection in the multi-client setting (Q2068378) (← links)
- Secure hybrid encryption in the standard model from hard learning problems (Q2118559) (← links)
- Implementing secure reporting of sexual misconduct -- revisiting WhoToo (Q2146102) (← links)
- Anonymous, robust post-quantum public key encryption (Q2170096) (← links)
- Anonymity of NIST PQC round 3 KEMs (Q2170102) (← links)
- Lattice trapdoors and IBE from middle-product LWE (Q2175903) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)
- Novel updatable identity-based hash proof system and its applications (Q2283028) (← links)
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness (Q2413008) (← links)
- Inner-product encryption under standard assumptions (Q2430410) (← links)
- Improved hidden vector encryption with short ciphertexts and tokens (Q2430414) (← links)
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme (Q2438535) (← links)
- Public-key authenticated encryption with keyword search revisited: security model and constructions (Q2660908) (← links)
- Public Key Encryption with Authorized Keyword Search (Q2817811) (← links)
- Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security (Q2817814) (← links)
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions (Q2829952) (← links)
- On the Anonymization of Cocks IBE Scheme (Q2947116) (← links)
- Oblivious Keyword Search with Authorization (Q2953857) (← links)
- Public-Key Encryption with Delegated Search (Q3011319) (← links)
- Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting (Q3104695) (← links)
- A New General Framework for Secure Public Key Encryption with Keyword Search (Q3194589) (← links)
- Practical Identity-Based Encryption Without Random Oracles (Q3593111) (← links)
- Generalized Identity Based and Broadcast Encryption Schemes (Q3600391) (← links)
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities (Q3600515) (← links)
- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption (Q3623033) (← links)
- Building Key-Private Public-Key Encryption Schemes (Q3634499) (← links)
- Verifiable Inner Product Encryption Scheme (Q5041153) (← links)
- Hierarchical Identity-Based Encryption with Tight Multi-challenge Security (Q5041156) (← links)
- Short Integrated PKE+PEKS in Standard Model (Q5055971) (← links)
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols (Q5458216) (← links)
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption (Q5458942) (← links)
- Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting (Q5859633) (← links)
- New Anonymity Notions for Identity-Based Encryption (Q5900461) (← links)
- New Anonymity Notions for Identity-Based Encryption (Q5902046) (← links)
- Public key authenticated searchable encryption against frequency analysis attacks (Q6121667) (← links)