Back to Results
First PageMeta Content
Key management / Paillier cryptosystem / Ciphertext indistinguishability / ElGamal encryption / Adaptive chosen-ciphertext attack / Hybrid cryptosystem / Cryptography / Public-key cryptography / Key encapsulation


Decryptable Searchable Encryption Thomas Fuhr1 and Pascal Paillier2 1 Direction Centrale de la S´ecurit´e des Syst`emes d’Information [removed]
Add to Reading List

Document Date: 2012-11-06 05:29:20


Open Document

File Size: 354,91 KB

Share Result on Facebook

City

Hierarchical / /

Company

Assume Bob / SIAM Journal / G1 / Gemalto Security Labs / /

/

IndustryTerm

revertible composition law / probabilistic algorithm / nd applications / telephone operator / secure management / probabilistic algorithms / well-identified bank accounts / telephone statement / revertible operator / computing / e-hellman / keyword search / /

Organization

US Federal Reserve / U.S. Securities and Exchange Commission / swiss army / /

Person

Alice / /

Position

Prime Minister / telephone operator / wb / police inspector / /

Product

Franklin / /

PublishedMedium

SIAM Journal on Computing / IEEE Transactions on Information Theory / Cryptology ePrint Archive / /

Technology

Encryption / decryptable searchable encryption / Cryptography / searchable encryption / public key / public-key encryption / PKI / 231 underlying searchable encryption / Identity-based encryption / private key / chosen-ciphertext secure encryption / secret key / trapdoor mechanism Decryptable Searchable Encryption / ID-based encryption / factoring-based encryption / ElGamal encryption / ID-based decryptable searchable encryption / 2007 Decryptable Searchable Encryption / keywords i.e. encryption / probabilistic algorithm / Public key encryption / /

URL

http /

SocialTag