Secure Search on Encrypted Data via Multi-Ring Sketch
暂无分享,去创建一个
[1] Myungsun Kim,et al. Better Security for Queries on Encrypted Databases , 2016, IACR Cryptol. ePrint Arch..
[2] Angelos D. Keromytis,et al. Blind Seer: A Scalable Private DBMS , 2014, 2014 IEEE Symposium on Security and Privacy.
[3] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[4] Jung Hee Cheon,et al. Secure searching of biomarkers through hybrid homomorphic encryption scheme , 2017, BMC Medical Genomics.
[5] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[6] Takeshi Koshiba,et al. New packing method in somewhat homomorphic encryption and its applications , 2015, Secur. Commun. Networks.
[7] Myungsun Kim,et al. Private Compound Wildcard Queries Using Fully Homomorphic Encryption , 2019, IEEE Transactions on Dependable and Secure Computing.
[8] Frank Wang,et al. Splinter: Practical Private Queries on Public Data , 2017, NSDI.
[9] Dan Feldman,et al. Secure Search via Multi-Ring Fully Homomorphic Encryption , 2018, IACR Cryptol. ePrint Arch..
[10] Aggelos Kiayias,et al. Multi-query Computationally-Private Information Retrieval with Constant Communication Rate , 2010, Public Key Cryptography.
[11] Michael Naehrig,et al. ML Confidential: Machine Learning on Encrypted Data , 2012, ICISC.
[12] Takeshi Koshiba,et al. Secure pattern matching using somewhat homomorphic encryption , 2013, CCSW.
[13] Mariana Raykova,et al. Low-Leakage Secure Search for Boolean Expressions , 2017, CT-RSA.
[14] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[15] Shai Halevi,et al. Algorithms in HElib , 2014, CRYPTO.
[16] Jung Hee Cheon,et al. Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data , 2016, IEEE Transactions on Information Forensics and Security.
[17] Ian Goldberg,et al. Revisiting the Computational Practicality of Private Information Retrieval , 2011, Financial Cryptography.
[18] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[19] Dan Feldman,et al. Secure Search on the Cloud via Coresets and Sketches , 2017, ArXiv.
[20] Zhi Liu,et al. Embark: Securely Outsourcing Middleboxes to the Cloud , 2016, NSDI.
[21] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[22] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[23] Frederik Vercauteren,et al. University of Birmingham Hardware assisted fully homomorphic function evaluation and encrypted search , 2016 .
[24] Berk Sunar,et al. Blind Web Search: How far are we from a privacy preserving search engine? , 2016, IACR Cryptol. ePrint Arch..
[25] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[26] Jun Sakuma,et al. Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data , 2016, NDSS.
[27] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[28] Fernando Krell Loy,et al. Secure Computation Towards Practical Applications , 2016 .
[29] Berk Sunar,et al. Bandwidth Efficient PIR from NTRU , 2014, Financial Cryptography Workshops.
[30] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[31] Rafail Ostrovsky,et al. A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.
[32] Michael Allen,et al. Parallel programming: techniques and applications using networked workstations and parallel computers , 1998 .
[33] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[34] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[35] Hao Chen,et al. Fast Private Set Intersection from Homomorphic Encryption , 2017, CCS.
[36] Bing Wang,et al. Search over Encrypted Data in Cloud Computing , 2016 .
[37] Michael Naehrig,et al. Private Computation on Encrypted Genomic Data , 2014, LATINCRYPT.
[38] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[39] Andreas Peter,et al. A Survey of Provably Secure Searchable Encryption , 2014, ACM Comput. Surv..
[40] Frederik Vercauteren,et al. Fully homomorphic SIMD operations , 2012, Designs, Codes and Cryptography.
[41] Jung Hee Cheon,et al. Homomorphic Computation of Edit Distance , 2015, IACR Cryptol. ePrint Arch..
[42] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[43] Craig Gentry,et al. Private Database Queries Using Somewhat Homomorphic Encryption , 2013, ACNS.
[44] Xiaoqian Jiang,et al. Protecting genomic data analytics in the cloud: state of the art and opportunities , 2016, BMC Medical Genomics.
[45] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.