Result Pattern Hiding Searchable Encryption for Conjunctive Queries
暂无分享,去创建一个
Dongxi Liu | Debdeep Mukhopadhyay | Ron Steinfeld | Joseph K. Liu | Sikhar Patranabis | Shifeng Sun | Amin Sakzad | Cong Zuo | Shangqi Lai | Joseph K. Liu | Ron Steinfeld | Dongxi Liu | Shangqi Lai | Shifeng Sun | A. Sakzad | Debdeep Mukhopadhyay | Sikhar Patranabis | Cong Zuo
[1] Joseph K. Liu,et al. Security Concerns in Popular Cloud Storage Services , 2013, IEEE Pervasive Computing.
[2] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[3] Stavros Papadopoulos,et al. Practical Private Range Search Revisited , 2016, SIGMOD Conference.
[4] Ronald Cramer,et al. Signature schemes based on the strong RSA assumption , 2000, TSEC.
[5] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[6] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[7] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[8] Scott Shenker,et al. Spark: Cluster Computing with Working Sets , 2010, HotCloud.
[9] Florence March,et al. 2016 , 2016, Affair of the Heart.
[10] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[11] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[12] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[13] David Cash,et al. Leakage-Abuse Attacks Against Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[14] Brice Minaud,et al. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives , 2017, CCS.
[15] Charles V. Wright,et al. Inference Attacks on Property-Preserving Encrypted Databases , 2015, CCS.
[16] C. Martin. 2015 , 2015, Les 25 ans de l’OMC: Une rétrospective en photos.
[17] Hugo Krawczyk,et al. Rich Queries on Encrypted Data: Beyond Exact Matches , 2015, ESORICS.
[18] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[19] Jonathan Katz,et al. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption , 2016, USENIX Security Symposium.
[20] Chunhua Su,et al. Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data , 2016, AsiaCCS.
[21] Tsz Hon Yuen,et al. An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries , 2016, ESORICS.
[22] Bala Srinivasan,et al. Secure sharing and searching for real-time video data in mobile cloud , 2015, IEEE Network.
[23] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[24] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[25] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[26] Bodo Möller,et al. Network Working Group Elliptic Curve Cryptography (ecc) Cipher Suites for Transport Layer Security (tls) , 2006 .
[27] Hugo Krawczyk,et al. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation , 2014, NDSS.
[28] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .
[29] Hairong Kuang,et al. The Hadoop Distributed File System , 2010, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST).
[30] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[31] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[32] Vincenzo Iovino,et al. Hidden-Vector Encryption with Groups of Prime Order , 2008, Pairing.
[33] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[34] Sanjay Ghemawat,et al. MapReduce: simplified data processing on large clusters , 2008, CACM.