Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data
暂无分享,去创建一个
[1] Donald E. Knuth,et al. The art of computer programming: sorting and searching (volume 3) , 1973 .
[2] I. C. Mogotsi,et al. Christopher D. Manning, Prabhakar Raghavan, and Hinrich Schütze: Introduction to information retrieval , 2010, Information Retrieval.
[3] Timothy J. Purcell. Sorting and searching , 2005, SIGGRAPH Courses.
[4] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[5] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.
[6] Hinrich Schütze,et al. Introduction to information retrieval , 2008 .
[7] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[8] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Jonathan Katz,et al. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? , 2012, NDSS.
[11] Kenneth E. Batcher,et al. Sorting networks and their applications , 1968, AFIPS Spring Joint Computing Conference.
[12] S. Rajsbaum. Foundations of Cryptography , 2014 .
[13] E. Szemerédi,et al. O(n LOG n) SORTING NETWORK. , 1983 .
[14] Helger Lipmaa,et al. An Oblivious Transfer Protocol with Log-Squared Communication , 2005, ISC.
[15] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[16] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[17] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[18] János Komlós,et al. An 0(n log n) sorting network , 1983, STOC.
[19] N. Cao,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[20] Donald E. Knuth,et al. The art of computer programming, volume 3: (2nd ed.) sorting and searching , 1998 .
[21] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[22] Mihir Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.
[23] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[24] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[25] Indrajit Ray,et al. Multi-keyword Similarity Search Over Encrypted Cloud Data , 2014, IACR Cryptol. ePrint Arch..
[26] Charalampos Papamanthou,et al. CS2: A Searchable Cryptographic Cloud Storage System , 2011 .
[27] Ben Adida,et al. How to Shuffle in Public , 2007, TCC.
[28] Ian F. Blake,et al. Strong Conditional Oblivious Transfer and Computing on Intervals , 2004, ASIACRYPT.
[29] Murat Kantarcioglu,et al. A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[30] Ivan Damgård,et al. Homomorphic encryption and secure comparison , 2008, Int. J. Appl. Cryptogr..
[31] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[32] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[33] Olga Ohrimenko,et al. Sorting and Searching Behind the Curtain , 2015, Financial Cryptography.
[34] Erkay Savas,et al. An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking , 2014, Distributed and Parallel Databases.
[35] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.
[36] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[37] Michael T. Goodrich,et al. Privacy-preserving group data access via stateless oblivious RAM simulation , 2011, SODA.
[38] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[39] Ivan Damgård,et al. A correction to 'efficient and secure comparison for on-line auctions' , 2009, Int. J. Appl. Cryptogr..
[40] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[41] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[42] Kristján Valur Jónsson,et al. Secure Multi-Party Sorting and Applications , 2011, IACR Cryptol. ePrint Arch..
[43] JUSTIN ZOBEL,et al. Inverted files for text search engines , 2006, CSUR.
[44] Erkay Savas,et al. Efficient and secure ranked multi-keyword search on encrypted cloud data , 2012, EDBT-ICDT '12.
[45] Yogesh K. Gedam. Fuzzy Keyword Search Over Encrypted Data in Cloud Computing , 2014 .
[46] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[47] Murat Kantarcioglu,et al. Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[48] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[49] Melissa Chase,et al. Structured Encryption and Controlled Disclosure , 2010, IACR Cryptol. ePrint Arch..
[50] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[51] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.