Sciweavers

15 search results - page 3 / 3
» Public Key Encryption with Conjunctive Field Keyword Search
Sort
View
IJNSEC
2010
128views more  IJNSEC 2010»
13 years 7 days ago
New Efficient Searchable Encryption Schemes from Bilinear Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu
ITIIS
2010
200views more  ITIIS 2010»
13 years 6 days ago
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key...
Kwangsu Lee, Dong Hoon Lee
CCIA
2009
Springer
13 years 6 months ago
A Cryptographic Solution for Private Distributed Simple Meeting Scheduling
Meeting Scheduling is a suitable application for distributed computation, motivated by its privacy requirements. Previous work on this problem have considered some cryptographic te...
Javier Herranz, Stan Matwin, Pedro Meseguer, Jordi...
CCS
2008
ACM
13 years 7 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
JOI
2008
129views more  JOI 2008»
13 years 5 months ago
Global scientific production on GIS research by bibliometric analysis from 1997 to 2006
A bibliometric analysis was applied in this work to evaluate global scientific production of geographic information system (GIS) papers from 1997 to 2006 in any journal of all the...
Yangge Tian, Cheng Wen, Song Hong