Property Preserving Symmetric Encryption

作者: Omkant Pandey , Yannis Rouselakis

DOI: 10.1007/978-3-642-29011-4_23

关键词:

摘要: … where cti is the encryption of mi for every i∈[k]. An important observation is … for symmetric encryption schemes, which will be the main focus of this work. 1 Property preserving encryption …

参考文章(64)
Ronald L Rivest, Len Adleman, Michael L Dertouzos, ON DATA BANKS AND PRIVACY HOMOMORPHISMS ,(1978)
Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters, Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption theory and application of cryptographic techniques. pp. 62- 91 ,(2010) , 10.1007/978-3-642-13190-5_4
Amit Sahai, Brent Waters, Fuzzy identity-based encryption theory and application of cryptographic techniques. ,vol. 3494, pp. 457- 473 ,(2005) , 10.1007/11426639_27
Mihir Bellare, Alexandra Boldyreva, Adam O’Neill, Deterministic and Efficiently Searchable Encryption Advances in Cryptology - CRYPTO 2007. pp. 535- 552 ,(2007) , 10.1007/978-3-540-74143-5_30
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Philippe Golle, Jessica Staddon, Brent Waters, Secure Conjunctive Keyword Search over Encrypted Data applied cryptography and network security. pp. 31- 45 ,(2004) , 10.1007/978-3-540-24852-1_3
Vipul Goyal, Abhishek Jain, Omkant Pandey, Amit Sahai, Bounded Ciphertext Policy Attribute Based Encryption Automata, Languages and Programming. pp. 579- 591 ,(2008) , 10.1007/978-3-540-70583-3_47
Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway, Relations Among Notions of Security for Public-Key Encryption Schemes international cryptology conference. pp. 26- 45 ,(1998) , 10.1007/BFB0055718
Carolyn Whitnall, Elisabeth Oswald, A comprehensive evaluation of mutual information analysis using a fair evaluation framework international cryptology conference. ,vol. 2011, pp. 316- 334 ,(2011) , 10.1007/978-3-642-22792-9_18
Elaine Shi, Brent Waters, Delegating Capabilities in Predicate Encryption Systems Automata, Languages and Programming. pp. 560- 578 ,(2008) , 10.1007/978-3-540-70583-3_46