Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM
暂无分享,去创建一个
Attila A. Yavuz | F. Betül Durak | Jorge Guajardo | Thang Hoang | J. Guajardo | F. Durak | Thang Hoang | A. Yavuz
[1] Elaine Shi,et al. Verifiable Oblivious Storage , 2014, Public Key Cryptography.
[2] Kartik Nayak,et al. Asymptotically Tight Bounds for Composing ORAM with PIR , 2017, Public Key Cryptography.
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] Jorge Guajardo,et al. Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware , 2015, SAC.
[5] Liehuang Zhu,et al. Search pattern leakage in searchable encryption: Attacks and new construction , 2014, Inf. Sci..
[6] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[7] Elaine Shi,et al. Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM , 2014, IACR Cryptol. ePrint Arch..
[8] Sanjam Garg,et al. TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[9] Guevara Noubir,et al. Toward Robust Hidden Volumes Using Write-Only Oblivious RAM , 2014, IACR Cryptol. ePrint Arch..
[10] Florian Kerschbaum,et al. Searchable Encryption with Secure and Efficient Updates , 2014, CCS.
[11] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[12] Carl A. Gunter,et al. Dynamic Searchable Encryption via Blind Storage , 2014, 2014 IEEE Symposium on Security and Privacy.
[13] Elaine Shi,et al. Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM , 2016, TCC.
[14] Raphael Bost,et al. Sophos - Forward Secure Searchable Encryption , 2016, IACR Cryptol. ePrint Arch..
[15] David Cash,et al. Leakage-Abuse Attacks Against Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[16] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[17] Muhammad Naveed,et al. The Fallacy of Composition of Oblivious RAM and Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[18] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[19] Geong Sen Poh,et al. Searchable Symmetric Encryption , 2017, ACM Comput. Surv..
[20] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[21] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[22] Hugo Krawczyk,et al. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation , 2014, NDSS.
[23] Elaine Shi,et al. Practical Dynamic Searchable Encryption with Small Leakage , 2014, NDSS.
[24] Ling Ren,et al. Path ORAM , 2012, J. ACM.
[25] Jonathan Katz,et al. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption , 2016, USENIX Security Symposium.
[26] Amos Beimel,et al. Robust Information-Theoretic Private Information Retrieval , 2002, SCN.
[27] Ian Goldberg,et al. Improving the Robustness of Private Information Retrieval , 2007 .
[28] Giovanni Russello,et al. ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage , 2017, FPS.
[29] Charles V. Wright,et al. The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption , 2016, CCS.
[30] Jorge Guajardo,et al. Practical and secure dynamic searchable encryption via oblivious access on distributed data structure , 2016, ACSAC.