Preface |
|
xi | |
Acknowledgements |
|
xiii | |
Author bio |
|
xv | |
|
1 Introduction to number theory and abstract algebra |
|
|
1 | (20) |
|
|
1 | (10) |
|
|
1 | (1) |
|
1.1.1.1 Divisibility properties |
|
|
2 | (1) |
|
|
2 | (1) |
|
1.1.2.1 Fundamental theorem of arithmetic |
|
|
2 | (1) |
|
1.1.2.2 Prime number properties |
|
|
3 | (1) |
|
1.1.3 Greatest common divisor (GCD) |
|
|
3 | (1) |
|
|
4 | (1) |
|
1.1.3.2 Extended Euclidean algorithm |
|
|
4 | (1) |
|
|
5 | (1) |
|
1.1.4.1 Congruence relation properties |
|
|
5 | (1) |
|
1.1.4.2 Reduced residue system modulo m |
|
|
6 | (1) |
|
|
6 | (1) |
|
1.1.4.4 Euler's phi function (totient function) |
|
|
7 | (1) |
|
|
7 | (1) |
|
1.1.4.6 Euler's generalization of Fermat's theorem |
|
|
7 | (1) |
|
1.1.5 Congruence solutions |
|
|
7 | (1) |
|
|
8 | (1) |
|
1.1.6.1 Euler's criterion |
|
|
9 | (1) |
|
|
9 | (1) |
|
1.1.7.1 Law of quadratic reciprocity |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
11 | (7) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
1.2.3.1 Symmetric finite group |
|
|
13 | (1) |
|
1.2.3.2 Group isomorphism |
|
|
14 | (1) |
|
|
14 | (1) |
|
1.2.3.4 Intersection of subgroups |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
1.2.5.2 Prime fields and their arithmetic |
|
|
16 | (1) |
|
1.2.5.3 Extension fields and their arithmetic |
|
|
16 | (1) |
|
1.2.5.4 Characteristic of a field |
|
|
17 | (1) |
|
1.3 Application to cryptography |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (3) |
|
2 Introduction to cryptography |
|
|
21 | (16) |
|
2.1 Introduction to cryptography |
|
|
21 | (1) |
|
2.2 Classification of ciphers |
|
|
22 | (3) |
|
2.2.1 Based on the type of operations |
|
|
22 | (1) |
|
2.2.1.1 Substitution cipher |
|
|
22 | (1) |
|
2.2.1.2 Transposition cipher |
|
|
23 | (1) |
|
2.2.2 Based on data processing |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
2.2.3 Based on the type of key |
|
|
25 | (1) |
|
2.3 Types of cryptographic techniques |
|
|
25 | (5) |
|
2.3.1 Public-key cryptography |
|
|
26 | (1) |
|
|
27 | (1) |
|
2.3.1.2 Security goals of a public-key cryptosystem |
|
|
27 | (1) |
|
2.3.1.3 Security attacks on a public-key cryptosystem |
|
|
28 | (1) |
|
2.3.1.4 ElGamal cryptosystem |
|
|
29 | (1) |
|
2.4 Generalizations in public-key cryptography |
|
|
30 | (4) |
|
2.4.1 Identity-based encryption (1BE) |
|
|
30 | (1) |
|
2.4.2 Attribute-based encryption (ABE) |
|
|
31 | (3) |
|
|
34 | (1) |
|
|
34 | (3) |
|
3 Searchable encryption and data management |
|
|
37 | (16) |
|
3.1 Need for searchable encryption |
|
|
37 | (1) |
|
|
38 | (1) |
|
3.3 Broad categorization of searchable encryption schemes |
|
|
39 | (10) |
|
3.3.1 Symmetric searchable encryption |
|
|
40 | (1) |
|
3.3.2 Searchable encryption in public-key setting |
|
|
41 | (1) |
|
|
41 | (1) |
|
3.3.2.2 The first pioneering SE scheme in a public-key setting |
|
|
42 | (7) |
|
|
49 | (1) |
|
|
50 | (3) |
|
4 Introduction to provable security and its application in searchable encryption |
|
|
53 | (16) |
|
|
53 | (3) |
|
4.1.1 Probabilistic and game-based security definition |
|
|
54 | (2) |
|
|
56 | (5) |
|
4.2.1 Example of reduction proof |
|
|
59 | (2) |
|
4.3 Common security definitions in searchable encryption |
|
|
61 | (2) |
|
4.4 Security/complexity assumptions and proof strategies |
|
|
63 | (3) |
|
4.4.1 Random oracle model and standard model |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
66 | (3) |
|
5 Searchable encryption in a public-key setting |
|
|
69 | (18) |
|
5.1 System definition and system model |
|
|
69 | (7) |
|
|
70 | (2) |
|
|
72 | (2) |
|
5.1.3 Flow of information between different parties involved in an SE system |
|
|
74 | (2) |
|
5.2 Broad categories of searchable encryption in a public-key setting |
|
|
76 | (8) |
|
5.2.1 IBE-based SE schemes |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
5.2.2 ABE-based SE schemes |
|
|
78 | (1) |
|
|
79 | (1) |
|
5.2.2.2 Attribute-based keyword search |
|
|
80 | (1) |
|
5.2.2.3 A key-policy attribute-based temporary keyword search |
|
|
80 | (1) |
|
5.2.2.4 Attribute-based searchable encryption for user level revocation |
|
|
80 | (1) |
|
5.2.2.5 Multi-authority attribute-based keyword search over encrypted cloud data |
|
|
81 | (1) |
|
5.2.2.6 Searchable encryption for mobile healthcare networks |
|
|
81 | (1) |
|
5.2.2.7 Attribute-based searchable encryption*-for non-monotonic access structure |
|
|
81 | (3) |
|
|
84 | (1) |
|
|
84 | (3) |
|
6 Design and development tools and inter-domain application |
|
|
87 | (6) |
|
6.1 Language and library options |
|
|
87 | (2) |
|
6.1.1 Toolkits for symmetric searchable encryption schemes |
|
|
87 | (1) |
|
6.1.2 Pairing libraries for searchable encryption in a public-key setting |
|
|
88 | (1) |
|
|
89 | (1) |
|
6.3 Inter-domain applications |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (2) |
|
7 Searchable encryption applications, challenges and future research directions |
|
|
93 | (6) |
|
7.1 Searchable encryption applications |
|
|
93 | (1) |
|
|
94 | (1) |
|
7.3 Directions for future work |
|
|
95 | (2) |
|
|
97 | (1) |
|
|
97 | (2) |
Index |
|
99 | |