1 |
W. Ogata, K. Kurosawa, 'Oblivious Keyword Search', Journal of complexity'04, Vol 20. April/Jun 2004
|
2 |
M. Rabin, 'How to exchange secrets by oblivious transfer', Technical Report TR 81, Aiken computation Lab, Harvard University
|
3 |
B. R. Waters, D. Balfanz, G. Durfee and D. K. Smetters, 'Building an Encrypted and Searchable Audit Log', 11th Annual Network and Distributed Security Symposium (NDSS '04); 2004
|
4 |
P. Golle, J. Staddon and B. Waters, 'Secure Conjunctive Keyword Search Over Encrypted Data', Proceedings of the Second International Conference on ACNS:Applied Cryptography and Network Security, 2004
|
5 |
Y. C. Chang , M. Mitzenmacher, 'privacy preserving keyword searches on remote encrypted data', ePrint, October 7th 2003
|
6 |
E. J. Goh, 'secure index', Cryptology ePrint Archive, October 7th 2003
|
7 |
D. Song, D. Wagner, and A. Perrige, 'Practical Techniques for searches on Encrypted Data', In Proc. of the 2000 IEEE Security and Privacy Symposium, May 2000
|
8 |
D. Park, K. Kim and P. Lee, 'Public key Encryption with Conjunctive Field Keyword Search', WISA'04, LNCS 3325, pp73-86, 2004
|
9 |
D. Boneh, G. D. Crescenzo, R. Ostrovsky and G. Persiano, 'Public key Encryption with Keyword Search', EUROCRYPT'04, 2004
|
10 |
M. Bellare, C. Namprempre, D. Pioncheval, 'The Power of RSA Onversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme', Proc. of Finandcial Cryptography 2001, LNCS vol. 2339, pp. 319-338
|
11 |
M. Noar and B. Pinkas, 'Efficient Oblivious trnasfer protocols', 12th Annual Symposium on Discrete Algorithms(SODA), pp 448-457(2001)
|