Cryptology ePrint Archive: Report 2005/377

Available versions in chronological order


Exclusion-Intersection Encryption and Its Application to Searchable Audit Log Encryption
Sherman S.M. Chow

Exclusion-Intersection Encryption and Its Application to Searchable Audit Log Encryption
Sherman S.M. Chow

Exclusion-Intersection Encryption and Its Application to Searchable Encryption
Sherman S.M. Chow

Exclusion-Intersection Encryption and Its Application to Searchable Encryption
Sherman S.M. Chow

Exclusion-Intersection Encryption and Its Application to Searchable Encryption
Sherman S.M. Chow

Exclusion-Intersection Encryption and Its Application to Searchable Encryption
Sherman S.M. Chow

Exclusion-Intersection Encryption
Sherman S.M. Chow and Siu-Ming Yiu
Publication Info: To appear in Intl. J. of Security & Networks (IJSN), 2011 Vol. 6. Preliminary version appeared in an INFOCOM workshop SCNC 2011.


[ Cryptology ePrint archive ]