Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307272
DOI10.1007/b97182zbMath1122.68424OpenAlexW2477185671WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307272
Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano, Dan Boneh
Publication date: 25 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b97182
Related Items
A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model, Attribute-Based Keyword Search from Lattices, Verifiable Inner Product Encryption Scheme, Extensions of IBE and Related Primitives, Short Integrated PKE+PEKS in Standard Model, Verifiable Range Query Processing for Cloud Computing, Public key encryption with distributed keyword search, Public Key Encryption with Flexible Pattern Matching, Quantum attribute-based encryption: a comprehensive study, LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search, Efficient and universally composable single secret leader election from pairings, Pattern matching in encrypted stream from inner product encryption, Security-enhanced public-key authenticated searchable encryption, Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey, M-EDESE: multi-domain, easily deployable, and efficiently searchable encryption, Encapsulated search index: public-key, sub-linear, distributed, and delegatable, Public key authenticated searchable encryption against frequency analysis attacks, How to compress encrypted data, Efficient Boolean search over encrypted data with reduced leakage, A Generic Construction of Integrated Secure-Channel Free PEKS and PKE, Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption, A survey on functional encryption, A generic construction of CCA-secure attribute-based encryption with equality test, Generic construction of trace-and-revoke inner product functional encryption, Public key authenticated encryption with keyword search from LWE, Public key encryption with hierarchical authorized keyword search, Limits of breach-resistant and snapshot-oblivious RAMs, Searchable encryption with randomized ciphertext and randomized keyword search, Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis, Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme, An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme, Blind Identity-Based Encryption and Simulatable Oblivious Transfer, Functional Encryption: Origins and Recent Developments, Robust Encryption, Revisited, Practical Identity-Based Encryption Without Random Oracles, Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles, Towards Robust Computation on Encrypted Data, Pairings in Trusted Computing, Hidden-Vector Encryption with Groups of Prime Order, Faster Implementation of η T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition, Threshold Privacy Preserving Keyword Searches, Generic constructions of integrated PKE and PEKS, Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks, Public Key Encryption with Searchable Keywords Based on Jacobi Symbols, Universally Anonymous IBE Based on the Quadratic Residuosity Assumption, Verifiable Stream Computation and Arthur--Merlin Communication, Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting, Privacy-Preserving Queries on Encrypted Data, Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity, A secure searchable encryption scheme for cloud using hash-based indexing, An efficient IBE scheme with tight security reduction in the random oracle model, Relations between robustness and RKA security under public-key encryption, Some basics on privacy techniques, anonymization and their big data challenges, Plaintext-Checkable Encryption, An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage, Predicate encryption supporting disjunctions, polynomial equations, and inner products, A privacy-preserving multi-keyword search approach in cloud computing, Anonymous IBE, leakage resilience and circular security from new assumptions, A New General Framework for Secure Public Key Encryption with Keyword Search, Towards Forward Security Properties for PEKS and IBE, Public key encryption with temporary and fuzzy keyword search, Lattice-based public-key encryption with equality test supporting flexible authorization in standard model, Group public key encryption with equality test against offline message recovery attack, A novel model for lattice-based authorized searchable encryption with special keyword, Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption, Efficient schemes for committing authenticated encryption, A query privacy-enhanced and secure search scheme over encrypted data in cloud computing, Public key encryption with equality test in the standard model, Public-key authenticated encryption with keyword search revisited: security model and constructions, Building a dynamic searchable encrypted medical database for multi-client, Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness, Bonsai trees, or how to delegate a lattice basis, A survey on design and implementation of protected searchable data in the cloud, Oblivious Keyword Search with Authorization, Efficient Asymmetric Index Encapsulation Scheme for Named Data, Implementing optimized pairings with elliptic nets, Timed-release computational secret sharing and threshold encryption, Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation, Witness-based searchable encryption, Expressive query over outsourced encrypted data, Certificateless public key encryption with equality test, Relations between semantic security and anonymity in identity-based encryption, Inner-product encryption under standard assumptions, Improved hidden vector encryption with short ciphertexts and tokens, CPP: towards comprehensive privacy preserving for query processing in information networks, Dual trapdoor identity-based encryption with keyword search, Public key based searchable encryption with fine-grained sender permission control, Improved security model for public-key authenticated encryption with keyword search, Public key encryption with fuzzy matching, Online parameterized dictionary matching with one gap, Low-Leakage Secure Search for Boolean Expressions, Fully homomorphic SIMD operations, Achieving IND-CCA Security for Functional Encryption for Inner Products, Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage, Cooperative private searching in clouds, Public key encryption with equality test from generic assumptions in the random oracle model, FSSE: forward secure searchable encryption with keyed-block chains, Effective error-tolerant keyword search for secure cloud computing, EPiC: efficient privacy-preserving counting for MapReduce, The relation and transformation between hierarchical inner product encryption and spatial encryption, Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups, Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity, Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems, Secure and efficient delegation of elliptic-curve pairing, Public key encryption with filtered equality test revisited, Secure deduplication storage systems supporting keyword search, On security against the server in designated tester public key encryption with keyword search, Public key encryption with keyword search secure against keyword guessing attacks without random oracle, Public-Key Encryption with Delegated Search, Searchable symmetric encryption over multiple servers, Identity-based encryption with outsourced equality test in cloud computing, Robust encryption, Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search, Mobile access and flexible search over encrypted cloud data in heterogeneous systems, Fuzzy matching: multi-authority attribute searchable encryption without central authority, Anonymous HIBE with short ciphertexts: full security in prime order groups, Plaintext checkable encryption with designated checker, Generic construction of designated tester public-key encryption with keyword search, Proxy re-encryption with keyword search, An Analysis of Affine Coordinates for Pairing Computation, Novel updatable identity-based hash proof system and its applications, On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography, Expressive attribute-based keyword search with constant-size ciphertext, Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms, Semi-order preserving encryption, Semi-generic construction of public key encryption and identity-based encryption with equality test, Deniable searchable symmetric encryption, An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks, Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data, An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services, Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits, Secure and Traceable Framework for Data Circulation, Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage, Public Key Encryption with Authorized Keyword Search, Linear Encryption with Keyword Search, Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions, Bounded Size-Hiding Private Set Intersection, Towards Restricting Plaintext Space in Public Key Encryption, Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Functional encryption for set intersection in the multi-client setting, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, On the Efficient Implementation of Pairing-Based Protocols, Robust Encryption, A generic scheme of plaintext-checkable database encryption, Public key encryption with equality test via hash proof system, Heuristic counting of Kachisa-Schaefer-Scott curves, Towards secure data retrieval for multi-tenant architecture using attribute-based key word search, Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model, A comparative study of dictionary matching with gaps: limitations, techniques and challenges