We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS). We define computational and statistical relaxations of the existing notion of perfect consistency, show that the scheme of Boneh et al. (Advances in Cryptology—EUROCRYPT 2004, ed. by C. Cachin, J. Camenisch, pp. 506–522, 2004) is computationally consistent, and provide a new scheme that is statistically consistent. We also provide a transform of an anonymous identity-based encryption (IBE) scheme to a secure PEKS scheme that, unlike the previous one, guarantees consistency. Finally, we suggest three extensions of the basic notions considered here, namely anonymous hierarchical ide...
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplif...
Public-key encryption with keyword search (PEKS) is a versatile tool. It allows a third party knowin...
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encr...
We identify and fill some gaps with regard to consistency (the extent to which false positives are p...
International audienceWe identify and fill some gaps with regard to consistency (the extent to which...
We identify and fill some gaps with regard to consistency (the extent to which false positives are p...
We identify and fill some gaps with regard to consistency (the extent to which false positives are p...
1. Public Key Encryption with Keyword Search (PEKS) • The concept was introduced by Boneh et al. (2...
Part 2: Work in ProgressInternational audiencePublic-key Encryption with Keyword Search (PEKS) allow...
Abstract. Asymmetric searchable encryption allows searches to be carried over cipher-texts, through ...
We survey the notion of provably secure Searchable Encryption (SE) by giving a complete and comprehe...
We survey the notion of provably secure Searchable Encryption (SE) by giving a complete and comprehe...
[[abstract]]Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypt...
Abstract. In cryptography, forward secrecy is a well-known property of key agreement protocols. It e...
Asymmetric searchable encryption allows searches to be carried over ciphertexts, through delegation,...
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplif...
Public-key encryption with keyword search (PEKS) is a versatile tool. It allows a third party knowin...
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encr...
We identify and fill some gaps with regard to consistency (the extent to which false positives are p...
International audienceWe identify and fill some gaps with regard to consistency (the extent to which...
We identify and fill some gaps with regard to consistency (the extent to which false positives are p...
We identify and fill some gaps with regard to consistency (the extent to which false positives are p...
1. Public Key Encryption with Keyword Search (PEKS) • The concept was introduced by Boneh et al. (2...
Part 2: Work in ProgressInternational audiencePublic-key Encryption with Keyword Search (PEKS) allow...
Abstract. Asymmetric searchable encryption allows searches to be carried over cipher-texts, through ...
We survey the notion of provably secure Searchable Encryption (SE) by giving a complete and comprehe...
We survey the notion of provably secure Searchable Encryption (SE) by giving a complete and comprehe...
[[abstract]]Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypt...
Abstract. In cryptography, forward secrecy is a well-known property of key agreement protocols. It e...
Asymmetric searchable encryption allows searches to be carried over ciphertexts, through delegation,...
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplif...
Public-key encryption with keyword search (PEKS) is a versatile tool. It allows a third party knowin...
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encr...