| 1 |
Secure Identity Based Encryption Without Random Oracles  |
미소장 |
| 2 |
Public Key Encryption with Keyword Search  |
미소장 |
| 3 |
Identity-Based Encryption from the Weil Pairing  |
미소장 |
| 4 |
M. Bellare and P. Rogaway, “Random oracles are practical: a paradigm for designing efficient protocols,” In ACM CCS, pp.62-73, November. 1993. |
미소장 |
| 5 |
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data  |
미소장 |
| 6 |
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)  |
미소장 |
| 7 |
Secure Integration of Asymmetric and Symmetric Encryption Schemes  |
미소장 |
| 8 |
C. Gentry, “Practical Identity-Based Encryption Without Random Oracles,” Advances in Cryptology - EUROCRYPTO 2006, LNCS 4004, pp.445-464, 2006. |
미소장 |
| 9 |
Constructing PEKS schemes secure against keyword guessing attacks is possible?  |
미소장 |
| 10 |
H. S. Rhee, J. H. Park, W. Susilo, and D. H. Lee, “Improved searchable Public key encryption with designated tester,” Proc. ASIACCS`09(to appear), March. 2009. |
미소장 |
| 11 |
D. Song, D. Wagner, and A. Perrig, “Practical Techniques for Searches on Encrypted Data,” Proceedings of IEEE Symposium on Security and Privacy, pp. 44-55, May. 2000. |
미소장 |
| 12 |
Efficient Identity-Based Encryption Without Random Oracles  |
미소장 |
| 13 |
Probabilistic Public Key Encryption with Equality Test  |
미소장 |
| 14 |
매일경제신문, “2천만 정보 유출”. (http://mbn. mk.co.kr/pages/news/newsView.php?news_seq_no=492145&category=mbn00000) |
미소장 |