Privacy Preserving Keyword Search with Access Control based on DTLS |
Noh, Geon-Tae
(Graduate School of Information Management and Security, Korea University)
Chun, Ji-Young (Graduate School of Information Management and Security, Korea University) Jeong, Ik-Rae (Graduate School of Information Management and Security, Korea University) Lee, Dong-Hoon (Graduate School of Information Management and Security, Korea University) |
1 | P. Golle, J. Staddon, and B.R. Waters, 'Secure Coniunctive Keyword Search over Encrypted Data,' ACNS, LNCS 3089, pp. 31-45, 2004 |
2 | E. Kushilevitz and R. Ostrovsky, 'Replication is NOT Needed: SINGLE Database, Computationally-Private Information Retrieval,' FOCS, pp. 364-373, Oct. 1997 |
3 | Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai, 'Batch Codes and Their Applications,' STOC, pp. 373-382, June 2004 |
4 | C. Gentry and Z. Ramzan, 'SingleDatabase Private Informatiori Retrieval with Constant Communication Rate,' ICALP, pp. 803-815, July 2005 |
5 | D. Boneh and B. Waters, 'Coniunctive, Subset, and Range Queries on Encrypted Data,' TCC, LNCS 4392, pp. 535-554, 2007 |
6 | C. Cachin, S. Micali, and M. Stadler, 'Computationally Private Information Retrieval with Polylogarithmic Communication,' EUROCRYPT, pp. 402-414, May 1999 DOI |
7 | 김선영, 서재우, 이필중, '검색 가능 암호 기술의 연구 동향,' 정보보호학회지, 19(2), pp. 63-73, 2009년 4월. |
8 | D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano, 'Public Key Encryption with Keyword Search,' EUROCRYPT, LNCS 3027, pp. 506-522, 2004 |
9 | R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, 'Searchable symmetric encryption: improved definitions and efficient constructions,' ACM Conference on Computer and Communications Security, pp. 79-88, Oct. 2006 DOI |
10 | E.J. Goh, 'Secure Indexes,' Technical report 2003/216, In IACR ePrint Cryptography Archive, Oct. 2003 |
11 | S.S. Yau and Y. Yin, 'Controlled privacy preserving keyword search,' AISACCS, pp. 321-324, Mar. 2008 DOI |
12 | Y.C. Chang and M. Mitzenmacher, 'Privacy Preserving Keyword Searches on Remote Encrypted Data,' ACNS, LNCS 3531, pp. 442-455, 2005 |
13 | J. Katz, A. Sahai, and B. Waters, 'Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products,' EUROCRYPT, LNCS 4965, pp. 146-162, 2008 |
14 | D. Boneh, E.J. Goh, and K. Nissim, 'Evaluating 2-DNF Formulas on Cipher-texts,' TCC, LNCS 3378, pp. 325-341, 2005 |
15 | D.X. Song, D. Wagner, and A. Perrig, 'Practical Techniques for Searches on Encrypted Data,' IEEE Computer Society, IEEE Symposium on Security and Privacy, pp. 44-55, May 2000 |