Conjunctive, Subset, and Range Queries on Encrypted Data
- 16 May 2007
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private KeysLecture Notes in Computer Science, 2006
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)Lecture Notes in Computer Science, 2006
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and ExtensionsLecture Notes in Computer Science, 2005
- Evaluating 2-DNF Formulas on CiphertextsLecture Notes in Computer Science, 2005
- Secure Conjunctive Keyword Search over Encrypted DataLecture Notes in Computer Science, 2004
- Software protection and simulation on oblivious RAMsJournal of the ACM, 1996
- Noninteractive Zero-KnowledgeSIAM Journal on Computing, 1991
- Efficient computation on oblivious RAMsPublished by Association for Computing Machinery (ACM) ,1990
- Non-interactive zero-knowledge and its applicationsPublished by Association for Computing Machinery (ACM) ,1988
- Space/time trade-offs in hash coding with allowable errorsCommunications of the ACM, 1970