Distributed Searchable Symmetric Encryption
暂无分享,去创建一个
Andreas Peter | Pieter H. Hartel | Qiang Tang | Huaxiong Wang | Willem Jonker | Hoon Wei Lim | Christoph Bösch | Bram Leenders | Andreas Peter | P. Hartel | Christoph Bösch | B. Leenders | Hoonwei Lim | Qiang Tang | Huaxiong Wang | W. Jonker
[1] Rafail Ostrovsky,et al. Efficient computation on oblivious RAMs , 1990, STOC '90.
[2] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[3] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[4] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[5] Helger Lipmaa,et al. Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption , 2000 .
[6] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[7] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[8] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[9] Leendert van Doorn,et al. The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer , 2004, IBM J. Res. Dev..
[10] Bill Cheswick,et al. Privacy-Enhanced Searches Using Encrypted Bloom Filters , 2004, IACR Cryptol. ePrint Arch..
[11] Dmitri Asonov. Querying Databases Privately: A New Approach to Private Information Retrieval , 2004, Lecture Notes in Computer Science.
[12] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[13] Chris Clifton,et al. Security Issues in Querying Encrypted Data , 2005, DBSec.
[14] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[15] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[16] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[17] Peishun Wang,et al. An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data , 2009, WISA.
[18] Peishun Wang,et al. Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups , 2008, CANS.
[19] Tal Malkin,et al. Secure anonymous database search , 2009, CCSW '09.
[20] Pieter H. Hartel,et al. Computationally Efficient Searchable Symmetric Encryption , 2010, Secure Data Management.
[21] Emiliano De Cristofaro,et al. Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information , 2011, TRUST.
[22] Kaoru Kurosawa,et al. UC-Secure Searchable Symmetric Encryption , 2012, Financial Cryptography.
[23] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[24] Pieter H. Hartel,et al. Selective Document Retrieval from Encrypted Database , 2012, ISC.
[25] Nihad Hadzic,et al. IBM 4765 cryptographic coprocessor , 2012, IBM J. Res. Dev..
[26] Craig Gentry,et al. Private Database Queries Using Somewhat Homomorphic Encryption , 2013, ACNS.
[27] Stefan Katzenbeisser,et al. Efficiently Outsourcing Multiparty Computation Under Multiple Keys , 2013, IEEE Transactions on Information Forensics and Security.
[28] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[29] Liehuang Zhu,et al. Search pattern leakage in searchable encryption: Attacks and new construction , 2014, Inf. Sci..