Executing authenticated computation on outsourced data is currently an area of major interest in cryptology. Large databases are being outsourced to untrusted servers without appreciable verification mechanisms. As adversarial server could produce erroneous output, clients should not trust the server's response blindly. Primitive set operations like union, set difference, intersection etc. can be invoked on outsourced data in different concrete settings and should be verifiable by the client. One such interesting adaptation is to authenticate email search result where the untrusted mail server has to provide a proof along with the search result. Recently Ohrimenko et al. proposed a scheme for authenticating email search. We suggest signific...
peer reviewedWe revisit the problem of entity authentication in decentralized end-to-end encrypted e...
In the setting of searchable symmetric encryption (SSE), a data owner D outsources a database (or do...
peer reviewedWe propose the use of password-authenticated key exchange (PAKE) for achieving and enha...
An integral component of modern computing is the ability to outsource data and computation to powerf...
In encrypted email system, how to search over encrypted cloud emails without decryption is an import...
When outsourcing data to third-party servers, searchable encryption is an important enabling techniq...
We address the problem of authenticating pattern matching queries over textual data that is outsourc...
In this paper we introduce Password Authenticated Keyword Search (PAKS), a cryptographic scheme wher...
The current trend towards outsourcing data storage and management to the cloud has largely been driv...
It is well known that the computation of bilinear pairing is the most expensive operation in pairing...
A new authentication mechanism for validating the source of messages over the Internet is designed a...
Email has become a common mode of communication for confidential personal as well as business needs....
An increasing number of enterprizes outsource database functionality to third-party service provider...
The single-writer/multi-reader searchable encryption (SMSE) allows an arbitrary authorized user to s...
We study the design of protocols for set-operation verification, namely the problem of cryptographic...
peer reviewedWe revisit the problem of entity authentication in decentralized end-to-end encrypted e...
In the setting of searchable symmetric encryption (SSE), a data owner D outsources a database (or do...
peer reviewedWe propose the use of password-authenticated key exchange (PAKE) for achieving and enha...
An integral component of modern computing is the ability to outsource data and computation to powerf...
In encrypted email system, how to search over encrypted cloud emails without decryption is an import...
When outsourcing data to third-party servers, searchable encryption is an important enabling techniq...
We address the problem of authenticating pattern matching queries over textual data that is outsourc...
In this paper we introduce Password Authenticated Keyword Search (PAKS), a cryptographic scheme wher...
The current trend towards outsourcing data storage and management to the cloud has largely been driv...
It is well known that the computation of bilinear pairing is the most expensive operation in pairing...
A new authentication mechanism for validating the source of messages over the Internet is designed a...
Email has become a common mode of communication for confidential personal as well as business needs....
An increasing number of enterprizes outsource database functionality to third-party service provider...
The single-writer/multi-reader searchable encryption (SMSE) allows an arbitrary authorized user to s...
We study the design of protocols for set-operation verification, namely the problem of cryptographic...
peer reviewedWe revisit the problem of entity authentication in decentralized end-to-end encrypted e...
In the setting of searchable symmetric encryption (SSE), a data owner D outsources a database (or do...
peer reviewedWe propose the use of password-authenticated key exchange (PAKE) for achieving and enha...