Secure Searchable Encryption and Data Management


Number TheoryDivisibilityDivisibility propertiesPrime NumbersFundamental theorem of arithmeticPrime number propertiesGreatest Common Divisor (gcd)Euclid’s theoremExtended Euclidean algorithmCongruenceCongruence relation propertiesReduced residue system modulo mInverse modulo mEuler’s phi function (totient function)Fermat’s theoremEuler’s generalization of Fermat’s theoremCongruence SolutionsQuadratic ResiduesEuler’s criterionLegendre SymbolLaw of quadratic reciprocityJacobi symbolAbstract AlgebraSemigroupMonoidGroupSymmetric finite groupGroup isomorphismSubgroupIntersection of subgroupsCyclic groupsRingFieldFinite fieldsPrime fields and their arithmeticExtension fields and their arithmetic Characteristic of a fieldApplication To CryptographySummaryReferencesIntroduction To CryptographyClassification Of CiphersBased On The Type Of OperationsSubstitution cipherTransposition cipherBased On Data ProcessingStream cipherBlock cipherBased On The Type Of KeyTypes Of Cryptographic TechniquesPublic-key CryptographySecurity modelsSecurity goals of a public-key cryptosystemSecurity attacks on a public-key cryptosystemElGamal cryptosystemGeneralizations In Public-key CryptographyIdentity-based Encryption (ibe)Attribute-based Encryption (abe)SummaryReferencesSearchable encryption and data managementNeed For Searchable EncryptionGeneral ModelBroad Categorization Of Searchable Encryption SchemesSymmetric Searchable EncryptionSearchable Encryption In Public-key SettingBilinear mapThe first pioneering SE scheme in a public-key settingSummaryReferencesSecurity DefinitionProbabilistic And Game-based Security DefinitionReduction ProofsExample Of Reduction ProofCommon Security Definitions In Searchable EncryptionSecurity/complexity Assumptions And Proof StrategiesRandom Oracle Model And Standard ModelSummaryReferencesSearchable encryption in a public-key settingSystem Definition And System ModelSystem DefinitionSystem ModelFlow Of Information Between Different Parties Involved In An Se SystemBroad Categories Of Searchable Encryption In A Public-key SettingIbe-based Se SchemesPEKS revisitedPEFKSAbe-based Se SchemesVABKSAttribute-based keyword searchA key-policy attribute-based temporary keyword searchAttribute-based searchable encryption for user level revocationMulti-authority attribute-based keyword search over encrypted cloud dataSearchable encryption for mobile healthcare networksAttribute-based searchable encryption for non-monotonic access structureSummaryReferencesDesign and development tools and inter-domain applicationLanguage And Library OptionsToolkits For Symmetric Searchable Encryption SchemesPairing Libraries For Searchable Encryption In A Public-key SettingData SetsInter-domain ApplicationsSummaryReferencesSearchable Encryption ApplicationsResearch ChallengesDirections For Future WorkSummaryReferences
 
Next >