Privacy Preserving Keyword Searches on Remote Encrypted Data
- 1 January 2005
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 442-455
- https://doi.org/10.1007/11496137_30
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- Public Key Encryption with Keyword SearchLecture Notes in Computer Science, 2004
- Efficient Sharing of Encrypted DataLecture Notes in Computer Science, 2002
- Foundations of CryptographyPublished by Cambridge University Press (CUP) ,2001
- How to Construct Pseudo-random Permutations from Pseudo-random FunctionsPublished by Springer Science and Business Media LLC ,2000
- On the construction of pseudo-random permutationsPublished by Association for Computing Machinery (ACM) ,1997
- Software protection and simulation on oblivious RAMsJournal of the ACM, 1996
- Space/time trade-offs in hash coding with allowable errorsCommunications of the ACM, 1970