A New General Framework for Secure Public Key Encryption with Keyword Search
暂无分享,去创建一个
Fuchun Guo | Yi Mu | Guomin Yang | Xiaofen Wang | Rongmao Chen | Y. Mu | Guomin Yang | Xiaofeng Wang | Rongmao Chen | F. Guo
[1] David Pointcheval,et al. New Techniques for SPHFs and Efficient One-Round PAKE Protocols , 2013, IACR Cryptol. ePrint Arch..
[2] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[3] David Pointcheval,et al. New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange , 2013, IACR Cryptol. ePrint Arch..
[4] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[5] David Pointcheval,et al. Smooth Projective Hashing for Conditionally Extractable Commitments , 2009, CRYPTO.
[6] Ronald Cramer,et al. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.
[7] Bok-Min Goi,et al. Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes , 2008, ATC.
[8] Yael Tauman Kalai,et al. Smooth Projective Hashing and Two-Message Oblivious Transfer , 2005, Journal of Cryptology.
[9] Dong Hoon Lee,et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester , 2010, J. Syst. Softw..
[10] David Pointcheval,et al. SPHF-Friendly Non-interactive Commitments , 2013, ASIACRYPT.
[11] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.
[12] David Pointcheval,et al. Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions , 2012, TCC.
[13] Willy Susilo,et al. Secure searchable public key encryption scheme against keyword guessing attacks , 2009, IEICE Electron. Express.
[14] Jonathan Katz,et al. Round-Optimal Password-Based Authenticated Key Exchange , 2011, TCC.
[15] Dalia Khader,et al. Public Key Encryption with Keyword Search Based on K-Resilient IBE , 2006, ICCSA.
[16] Yehuda Lindell,et al. A Framework for Password-Based Authenticated Key Exchange , 2003, EUROCRYPT.
[17] David Pointcheval,et al. Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages , 2013, IACR Cryptol. ePrint Arch..
[18] Dong Hoon Lee,et al. Constructing PEKS schemes secure against keyword guessing attacks is possible? , 2009, Comput. Commun..
[19] Mihir Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.
[20] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[21] Joonsang Baek,et al. On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search , 2006, ISC.
[22] Vishal Saraswat,et al. Public Key Encryption with Searchable Keywords Based on Jacobi Symbols , 2007, INDOCRYPT.
[23] Dong Hoon Lee,et al. Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data , 2006, Secure Data Management.