Open Access System for Information Sharing

Login Library

 

Article
Cited 201 time in webofscience Cited 212 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorPark, DJ-
dc.contributor.authorKim, K-
dc.contributor.authorLee, PJ-
dc.date.accessioned2016-04-01T02:14:46Z-
dc.date.available2016-04-01T02:14:46Z-
dc.date.created2009-03-20-
dc.date.issued2005-01-
dc.identifier.issn0302-9743-
dc.identifier.other2005-OAK-0000004916-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/24742-
dc.description.abstractIn a public key encryption, we may want to enable someone to test whether something is a keyword in a given document without leaking anything else about the document. An email gateway, for example, may be desired to test whether the email contains a keyword "urgent" so that it could route the email accordingly, without leaking any content to the gateway. This mechanism was referred as public key encryption with keyword search [4]. Similarly, a user may want to enable an email gateway to search keywords conjunctively, such as "urgent" email from "Bob" about "finance", without leaking anything else about the email. We refer to this mechanism as public key encryption with conjunctive field keyword search. In this paper, we define the security model of this mechanism and propose two efficient schemes whose security is proved in the random oracle model.-
dc.description.statementofresponsibilityX-
dc.languageEnglish-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.relation.isPartOfLECTURE NOTES IN COMPUTER SCIENCE-
dc.subjectconjunctive keyword search-
dc.subjectpairing-based cryptography-
dc.subjectRANDOM ORACLES-
dc.subjectPAIRINGS-
dc.subjectCRYPTOSYSTEMS-
dc.titlePublic key encryption with conjunctive field keyword search-
dc.typeArticle-
dc.contributor.college전자전기공학과-
dc.identifier.doi10.1007/978-3-540-31815-6_7-
dc.author.googlePark, DJ-
dc.author.googleKim, K-
dc.author.googleLee, PJ-
dc.relation.volume3325-
dc.relation.startpage73-
dc.relation.lastpage86-
dc.contributor.id10051689-
dc.relation.journalLECTURE NOTES IN COMPUTER SCIENCE-
dc.relation.indexSCI급, SCOPUS 등재논문-
dc.relation.sciSCIE-
dc.collections.nameConference Papers-
dc.type.rimsART-
dc.identifier.bibliographicCitationLECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.73 - 86-
dc.identifier.wosid000227471900007-
dc.date.tcdate2019-02-01-
dc.citation.endPage86-
dc.citation.startPage73-
dc.citation.titleLECTURE NOTES IN COMPUTER SCIENCE-
dc.citation.volume3325-
dc.contributor.affiliatedAuthorLee, PJ-
dc.identifier.scopusid2-s2.0-23944469009-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.wostc30-
dc.type.docTypeArticle; Proceedings Paper-
dc.subject.keywordPlusRANDOM ORACLES-
dc.subject.keywordPlusPAIRINGS-
dc.subject.keywordPlusCRYPTOSYSTEMS-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

이필중LEE, PIL JOONG
Dept of Electrical Enginrg
Read more

Views & Downloads

Browse