Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-74143-5_30
|View full text |Cite
|
Sign up to set email alerts
|

Deterministic and Efficiently Searchable Encryption

Abstract: Abstract. We present as-strong-as-possible definitions of privacy, and constructions achieving them, for public-key encryption schemes where the encryption algorithm is deterministic. We obtain as a consequence database encryption methods that permit fast (i.e. sub-linear, and in fact logarithmic, time) search while provably providing privacy that is as strong as possible subject to this fast search constraint. One of our constructs, called RSA-DOAEP, has the added feature of being length preserving, so that i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
552
0
2

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 560 publications
(555 citation statements)
references
References 48 publications
1
552
0
2
Order By: Relevance
“…Moreover, for public-key encryption (as cryptosystem C) and Chosen Distribution Attack [1,2] (as game S) we will prove that C(WRO) is S-secure, which implies the appropriateness of the new concept of the WRO model.…”
Section: Our Contributions -A New Proposal Of Wro Methodsology -mentioning
confidence: 86%
See 4 more Smart Citations
“…Moreover, for public-key encryption (as cryptosystem C) and Chosen Distribution Attack [1,2] (as game S) we will prove that C(WRO) is S-secure, which implies the appropriateness of the new concept of the WRO model.…”
Section: Our Contributions -A New Proposal Of Wro Methodsology -mentioning
confidence: 86%
“…In the framework with which the MRH theorem is proven, two interfaces of a system F among adversaries and honest parities are considered, an "adversarial interface" accessed by adversaries, denoted by F.adv, and an "honest interface" accessed by honest parties, denoted by F.hon. The indifferentiable game of F 1 F 2 is a simulation based game where constructing some stateful simulator S which represents some adversary in the F 2 model which can obtain any information on F 1 .adv in the F 1 model by using information on F 2 .adv. The definition of F 1 F 2 is that there exists a stateful simulator S such that for any distinguisher D which interacts with two oracles (L, R), no D can distinguish a real world (L, R) = (F 1 .hon, F 2 .adv) from an ideal world (L, R) = (F 2 .hon, S F 2 .adv ) where S has access to F 2 .adv.…”
Section: Indifferentiabilitymentioning
confidence: 99%
See 3 more Smart Citations