Sciweavers

88 search results - page 3 / 18
» Public Key Encryption with Keyword Search
Sort
View
136
Voted
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
15 years 9 months ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...
131
Voted
IJNSEC
2010
128views more  IJNSEC 2010»
14 years 10 months ago
New Efficient Searchable Encryption Schemes from Bilinear Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu
172
Voted
CTRSA
2012
Springer
285views Cryptology» more  CTRSA 2012»
13 years 11 months ago
Plaintext-Checkable Encryption
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
Sébastien Canard, Georg Fuchsbauer, Aline G...
161
Voted
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
PQCRYPTO
2010
298views Cryptology» more  PQCRYPTO 2010»
15 years 7 months ago
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
Abstract. In this paper a new structural attack on the McEliece/Niederreiter public key cryptosystem based on subcodes of generalized ReedSolomon codes proposed by Berger and Loidr...
Christian Wieschebrink