Deterministic and Efficiently Searchable Encryption
- 9 August 2007
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableThis publication has 15 references indexed in Scilit:
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)Lecture Notes in Computer Science, 2006
- Modeling and assessing inference exposure in encrypted databasesACM Transactions on Information and System Security, 2005
- Efficient Tree Search in Encrypted DataInformation Systems Security, 2004
- Reclaiming space from duplicate files in a serverless distributed file systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Nonmalleable CryptographySIAM Journal on Computing, 2000
- The Notion of Security for Probabilistic CryptosystemsSIAM Journal on Computing, 1988
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- New directions in cryptographyIEEE Transactions on Information Theory, 1976