Cryptology ePrint Archive: Report 2005/377
Available versions in chronological order
20051023:205038 (posted 23-Oct-2005 20:50:38 UTC)
Exclusion-Intersection Encryption and Its Application to Searchable Audit Log Encryption
Sherman S.M. Chow
20051116:061851 (posted 16-Nov-2005 06:18:51 UTC)
Exclusion-Intersection Encryption and Its Application to Searchable Audit Log Encryption
Sherman S.M. Chow
20051116:062401 (posted 16-Nov-2005 06:24:01 UTC)
Exclusion-Intersection Encryption and Its Application to Searchable Encryption
Sherman S.M. Chow
20051116:062450 (posted 16-Nov-2005 06:24:50 UTC)
Exclusion-Intersection Encryption and Its Application to Searchable Encryption
Sherman S.M. Chow
20051116:062509 (posted 16-Nov-2005 06:25:09 UTC)
Exclusion-Intersection Encryption and Its Application to Searchable Encryption
Sherman S.M. Chow
20051116:062554 (posted 16-Nov-2005 06:25:54 UTC)
Exclusion-Intersection Encryption and Its Application to Searchable Encryption
Sherman S.M. Chow
20110823:012558 (posted 23-Aug-2011 01:25:58 UTC)
Exclusion-Intersection Encryption
Sherman S.M. Chow and Siu-Ming Yiu
Publication Info: To appear in Intl. J. of Security & Networks (IJSN), 2011 Vol. 6. Preliminary version appeared in an INFOCOM workshop SCNC 2011.
[
Cryptology ePrint archive
]