Back to Results
First PageMeta Content
Cipher / RSA / Probabilistic encryption / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Advantage


Predicate Privacy in Encryption Systems Emily Shen MIT Elaine Shi
Add to Reading List

Document Date: 2008-12-24 17:15:01


Open Document

File Size: 320,67 KB

Share Result on Facebook

Company

CNF / Bilinear / /

/

Holiday

Assumption / /

IndustryTerm

setup algorithm / storage server / inner product / token generation algorithm / larger / predicate encryption solution / inner products / query algorithm / generator algorithm / cyclic groups / encryption algorithm / keyword search / /

Organization

National Science Foundation / Diffie-Hellman / MIT / U.S. Department of Homeland Security / /

Person

Gq / Brent Waters / Elaine Shi / /

Position

administrative assistant / /

ProvinceOrState

Saskatchewan / Connecticut / /

Technology

Encryption / public-key predicate encryption / anonymous identity-based encryption / predicate encryption / 2008 Abstract Predicate encryption / public key / public-key encryption / encryption algorithm / generator algorithm / setup algorithm / Identity-Based Encryption / encryption system / secret key / token generation algorithm / PPT algorithms / symmetric-key predicate encryption / 2 1.2 Related Work Public-Key Predicate Encryption / query algorithm / Attribute-Based Encryption / /

SocialTag