- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources1
- Resource Type
-
0001000000000000
- More
- Availability
-
10
- Author / Contributor
- Filter by Author / Creator
-
-
Aronesty, Erik (1)
-
Cash, David (1)
-
Dodis, Yevgeniy (1)
-
Gallancy, Daniel H. (1)
-
Karthikeyan, Harish (1)
-
Tysor, Oren (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
& Ahmed, K. (0)
-
& Ahmed, Khadija. (0)
-
& Aina, D.K. Jr. (0)
-
& Akcil-Okan, O. (0)
-
& Akuom, D. (0)
-
& Aleven, V. (0)
-
& Andrews-Larson, C. (0)
-
& Archibald, J. (0)
-
- Filter by Editor
-
-
Hanaoka, Goichiro (1)
-
Shikata, Junji (1)
-
Watanabe, Yohei (1)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Hanaoka, Goichiro; Shikata, Junji; Watanabe, Yohei (Ed.)We build the first sub-linear (in fact, potentially constant-time) public-key searchable encryption system: server can publish a public key PK. anybody can build an encrypted index for document D under PK. client holding the index can obtain a token ๐ง๐ค from the server to check if a keyword w belongs to D. search using ๐ง๐ค is almost as fast (e.g., sub-linear) as the non-private search. server granting the token does not learn anything about the document D, beyond the keyword w. yet, the token ๐ง๐ค is specific to the pair (D, w): the client does not learn if other keywords ๐คโฒโ ๐ค belong to D, or if w belongs to other, freshly indexed documents ๐ทโฒ. server cannot fool the client by giving a wrong token ๐ง๐ค. We call such a primitive Encapsulated Search Index (ESI). Our ESI scheme can be made (t, n)-distributed among n servers in the best possible way: non-interactive, verifiable, and resilient to any coalition of up to (๐กโ1) malicious servers. We also introduce the notion of delegatable ESI and show how to extend our construction to this setting. Our solution โ including public indexing, sub-linear search, delegation, and distributed token generation โ is deployed as a commercial application by a real-world company.more » « less
An official website of the United States government
