• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,038
Next 10 →

Encrypted Keyword Search in a Distributed Storage System

by Shay Artzi, Calvin Newport, David Schultz
"... ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract not found

Public Key Encryption with Keyword Search

by Dan Boneh, Giovanni Di Crescenzo , Rafail Ostrovsky , Giuseppe Persiano
"... ..."
Abstract - Cited by 383 (12 self) - Add to MetaCart
Abstract not found

On The Limits of Steganography

by Ross Anderson, Fabien Petitcolas - IEEE Journal of Selected Areas in Communications , 1998
"... In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and tra#c security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches---many of them developed to ..."
Abstract - Cited by 413 (2 self) - Add to MetaCart
to hide encrypted copyright marks or serial numbers in digital audio or video. We then present a number of attacks, some new, on such information hiding schemes. This leads to a discussion of the formidable obstacles that lie in the way of a general theory of information hiding systems (in the sense

Privacy Preserving Keyword Searches on Remote Encrypted Data

by Yan-cheng Chang, Michael Mitzenmacher , 2004
"... We consider the following problem: a user wants to store his files in an encrypted form on a remote file server S. ..."
Abstract - Cited by 154 (0 self) - Add to MetaCart
We consider the following problem: a user wants to store his files in an encrypted form on a remote file server S.

Public Key Encryption with Keyword Search Revisited

by Joonsang Baek, Reihaneh Safiavi-naini, Willy Susilo , 2005
"... The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, "r ..."
Abstract - Cited by 43 (2 self) - Add to MetaCart
The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, "

Secure Conjunctive Keyword Search over Encrypted Data

by Philippe Golle, Jessica Staddon, Brent Waters - ACNS 04: 2nd International Conference on Applied Cryptography and Network Security , 2004
"... We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterion, the user gives the server a capability that allows the server to identify exactly those documents. ..."
Abstract - Cited by 105 (1 self) - Add to MetaCart
We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterion, the user gives the server a capability that allows the server to identify exactly those documents.

Searchable Keyword-Based Encryption

by Dong Jin Park, Juyoung Cha, Pil Joong Lee , 2005
"... To solve the problem of searching on encrypted data, many keyword search schemes have been proposed in recent years. The goal of such schemes is to enable a user to give an untrusted storage server the ability only to test whether an encrypted document contains a few keywords without learning anyt ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
To solve the problem of searching on encrypted data, many keyword search schemes have been proposed in recent years. The goal of such schemes is to enable a user to give an untrusted storage server the ability only to test whether an encrypted document contains a few keywords without learning

Feasibility of a Serverless Distributed File System Deployed on an Existing Set of Desktop PCs

by William J. Bolosky, John R. Douceur, David Ely, Marvin Theimer - Proc. ACM SIGMETRICS , 2000
"... We consider an architecture for a serverless distributed file system that does not assume mutual trust among the client computers. The system provides security, availability, and reliability by distributing multiple encrypted replicas of each file among the client machines. To assess the feasibility ..."
Abstract - Cited by 325 (9 self) - Add to MetaCart
We consider an architecture for a serverless distributed file system that does not assume mutual trust among the client computers. The system provides security, availability, and reliability by distributing multiple encrypted replicas of each file among the client machines. To assess

Mixminion: Design of a Type III Anonymous Remailer Protocol

by George Danezis, Roger Dingledine, David Hopwood, Nick Mathewson - In Proceedings of the 2003 IEEE Symposium on Security and Privacy , 2003
"... Abstract. We present Mixminion, a message-based anonymous remailer protocol that supports secure single-use reply blocks. MIX nodes cannot distinguish Mixminion forward messages from reply messages, so forward and reply messages share the same anonymity set. We add directory servers that allow users ..."
Abstract - Cited by 300 (44 self) - Add to MetaCart
users to learn public keys and performance statistics of participating remailers, and we describe nymservers that allow users to maintain long-term pseudonyms using single-use reply blocks as a primitive. Our design integrates link encryption between remailers to provide forward anonymity. Mixminion

Searching Keywords with Wildcards on Encrypted Data

by Saeed Sedghi, Peter Van Liesdonk, Svetla Nikova, Pieter Hartel, Willem Jonker
"... Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption key is also derived from such a vector, but this one is also allowed to have “⋆ ” (or wildcard) entries. Decryption is pos ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
). Another interesting application – and our main motivation – is to create searchable encryption schemes that support queries for keywords containing wildcards. Here we construct a new HVE scheme, based on bilinear groups of prime order, which supports vectors over any alphabet. The resulting ciphertext
Next 10 →
Results 1 - 10 of 1,038
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University