{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T22:01:08Z","timestamp":1776290468019,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540219354","type":"print"},{"value":"9783540246763","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24676-3_30","type":"book-chapter","created":{"date-parts":[[2010,8,4]],"date-time":"2010-08-04T04:33:13Z","timestamp":1280896393000},"page":"506-522","source":"Crossref","is-referenced-by-count":1689,"title":["Public Key Encryption with Keyword Search"],"prefix":"10.1007","author":[{"given":"Dan","family":"Boneh","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Di Crescenzo","sequence":"additional","affiliation":[]},{"given":"Rafail","family":"Ostrovsky","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Persiano","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1007\/3-540-45682-1_33","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"M. Bellare","year":"2001","unstructured":"Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-Privacy in Public-Key Encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, p. 566. Springer, Heidelberg (2001)"},{"key":"#cr-split#-30_CR2.1","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. SIAM J. of Computing??32(3), 586???615 (2003);","DOI":"10.1137\/S0097539701398521"},{"key":"#cr-split#-30_CR2.2","unstructured":"Extended abstract in Kilian, J. (ed.): CRYPTO 2001. LNCS, vol.??2139, pp. 586???615. Springer, Heidelberg (2001)"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Eighth IMA International Conference on Cryptography and Coding, Royal Agricultural College, Cirencester, UK (December 2001)","DOI":"10.1007\/3-540-45325-3_32"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Cachin, C., Micali, S., Stadler, M.: Computationally Private Information Retrieval with Polylogarithmic Communication Eurcrypt 1999 (1999)","DOI":"10.1007\/3-540-48910-X_28"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private Information Retrieval. In: FOCS (1995); (also Journal of ACM)","DOI":"10.1109\/SFCS.1995.492461"},{"key":"30_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/3-540-44598-6_14","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"J. Coron","year":"2000","unstructured":"Coron, J.: On the exact security of Full-Domain-Hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 229\u2013235. Springer, Heidelberg (2000)"},{"key":"#cr-split#-30_CR7.1","doi-asserted-by":"crossref","unstructured":"Dolev, D., Dwork, C., Naor, M.: Non-Malleable Cryptography. SIAM Journal on Computing (2000);","DOI":"10.1137\/S0097539795291562"},{"key":"#cr-split#-30_CR7.2","unstructured":"Early version in proceedings of STOC 1991 (1991)"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Di Crescenzo, G., Ishai, Y., Ostrovsky, R.: Universal service-providers for database private information retrieval. In: Proc. of the 17th Annu. ACM Symp. on Principles of Distributed Computing, pp. 91\u2013100 (1998)","DOI":"10.1145\/277697.277713"},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/3-540-45539-6_10","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"G. Crescenzo Di","year":"2000","unstructured":"Di Crescenzo, G., Malkin, T., Ostrovsky, R.: Single-database private information retrieval implies oblivious transfer. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, p. 122. Springer, Heidelberg (2000)"},{"key":"30_CR10","unstructured":"Iliev, A., Smith, S.: Privacy-enhanced credential services. Second annual PKI workshop (see also Darthmoth Technical Report TR-2003-442, http:\/\/www.cs.dartmouth.edu\/sws\/papers\/ilsm03.pdf"},{"key":"30_CR11","unstructured":"Galbraith, S.: private communications"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Desmedt, Y.: Computer security by redefining what a computer is. In: Proceedings New Security Paradigms II Workshop, pp. 160\u2013166 (1992)","DOI":"10.1145\/283751.283834"},{"key":"30_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/3-540-46035-7_5","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"Y. Dodis","year":"2002","unstructured":"Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-insulated public key cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 65\u201382. Springer, Heidelberg (2002)"},{"key":"30_CR14","doi-asserted-by":"publisher","DOI":"10.1142\/9789812798183","volume-title":"Combinatorial Group Testing and its Applications","author":"D.Z. Du","year":"1993","unstructured":"Du, D.Z., Hwang, F.K.: Combinatorial Group Testing and its Applications. World Scientific, Singapore (1993)"},{"key":"30_CR15","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/BF02772959","volume":"51","author":"P. Erdos","year":"1985","unstructured":"Erdos, P., Frankl, P., Furedi, Z.: Families of finite sets in which no set is covered by the union of r others. Israeli Journal of Mathematics\u00a051, 79\u201389 (1985)","journal-title":"Israeli Journal of Mathematics"},{"key":"30_CR16","unstructured":"Goh, E.: Building Secure Indexes for Searching Efficiently on Encrypted Compressed Data, http:\/\/eprint.iacr.org\/2003\/216\/"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation by oblivious RAMs. JACM (1996)","DOI":"10.1145\/233551.233553"},{"issue":"4","key":"30_CR18","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"Goldreich, O., Goldwasser, S., Micali, S.: How To Construct Random Functions. Journal of the Association for Computing Machinery\u00a033(4), 792\u2013807 (1986)","journal-title":"Journal of the Association for Computing Machinery"},{"issue":"2","key":"30_CR19","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic Encryption. Journal of Computer and System Sciences\u00a028(2), 270\u2013299 (1984)","journal-title":"Journal of Computer and System Sciences"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. In: Proc. of the 30th Annual ACM Symposium on the Theory of Computing, pp. 151\u2013160 (1998)","DOI":"10.1145\/276698.276723"},{"key":"30_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/3-540-45455-1_3","volume-title":"Algorithmic Number Theory","author":"A. Joux","year":"2002","unstructured":"Joux, A.: The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol.\u00a02369, p. 20. Springer, Heidelberg (2002)"},{"key":"30_CR22","unstructured":"Kushilevitz, E., Ostrovsky, R.: Replication is not needed: Single Database, Computationally-Private Information Retrieval. In: FOCS 1997 (1997)"},{"key":"30_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-45539-6_9","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"E. Kushilevitz","year":"2000","unstructured":"Kushilevitz, E., Ostrovsky, R.: One-way Trapdoor Permutations are Sufficient for Non-Trivial Single-Database Computationally-Private Information Retrieval. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, p. 104. Springer, Heidelberg (2000)"},{"key":"30_CR24","doi-asserted-by":"crossref","unstructured":"Maniatis, P., Roussopoulos, M., Swierk, E., Lai, K., Appenzeller, G., Zhao, X., Baker, M.: The Mobile People Architecture. ACM Mobile Computing and Communications Review (MC2R)\u00a03(3) (July 1999)","DOI":"10.1145\/329124.329153"},{"key":"30_CR25","doi-asserted-by":"crossref","unstructured":"Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: Proc. of the 31th Annu. ACM Symp. on the Theory of Computing, pp. 245\u2013254 (1999)","DOI":"10.1145\/301250.301312"},{"key":"30_CR26","unstructured":"Ostrovsky, R.: Software protection and simulation on oblivious RAMs. MIT Ph.D. Thesis, 1992. Preliminary version in Proc. 22nd Annual ACM Symp. Theory Comp. (1990)"},{"key":"30_CR27","doi-asserted-by":"crossref","unstructured":"Ogata, W., Kurosawa, K.: Oblivious keyword search. J. of Complexity (to appear)","DOI":"10.1016\/j.jco.2003.08.023"},{"key":"30_CR28","unstructured":"Song, D., Wagner, D., Perrig, A.: Practical Techniques for Searches on Encrypted Data. In: Proc. of the 2000 IEEE symposium on Security and Privacy, S&P 2000 (2000)"},{"key":"30_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"30_CR30","unstructured":"Waters, B., Balfanz, D., Durfee, G., Smetters, D.: Building an encrypted and searchable audit log. In: NDSS 2004 (2004) (to appear)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - EUROCRYPT 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24676-3_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T19:43:20Z","timestamp":1740339800000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24676-3_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540219354","9783540246763"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24676-3_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}