Error-Tolerant Searchable Encryption
暂无分享,去创建一个
[1] Dalia Khader,et al. Public Key Encryption with Keyword Search Based on K-Resilient IBE , 2006, ICCSA.
[2] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[3] Craig Gentry,et al. Single-Database Private Information Retrieval with Constant Communication Rate , 2005, ICALP.
[4] Piotr Indyk,et al. Nearest Neighbors in High-Dimensional Spaces , 2004, Handbook of Discrete and Computational Geometry, 2nd Ed..
[5] Jacob C. N. Schuldt,et al. Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards , 2007, ACISP.
[6] Helger Lipmaa,et al. An Oblivious Transfer Protocol with Log-Squared Communication , 2005, ISC.
[7] Rafail Ostrovsky,et al. Public Key Encryption That Allows PIR Queries , 2007, CRYPTO.
[8] William Gasarch. A Survey on Private Information Retrieval , 2004 .
[9] Rafail Ostrovsky,et al. Efficient search for approximate nearest neighbor in high dimensional spaces , 1998, STOC '98.
[10] Rafail Ostrovsky,et al. Private information storage (extended abstract) , 1997, STOC '97.
[11] Qiang Tang,et al. Extended Private Information Retrieval and Its Application in Biometrics Authentications , 2007, CANS.
[12] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[13] Qiang Tang,et al. An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication , 2007, ACISP.
[14] Pim Tuyls,et al. Efficient Binary Conversion for Paillier Encrypted Values , 2006, EUROCRYPT.
[15] Eike Kiltz,et al. Generalized Key Delegation for Hierarchical Identity-Based Encryption , 2007, ESORICS.
[16] Feng Hao,et al. A Fast Search Algorithm for a Large Fuzzy Database , 2008, IEEE Transactions on Information Forensics and Security.
[17] Piotr Indyk,et al. Approximate nearest neighbors: towards removing the curse of dimensionality , 1998, STOC '98.
[18] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[19] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[20] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[21] Rafail Ostrovsky,et al. Algebraic Lower Bounds for Computing on Encrypted Data , 2007, Electron. Colloquium Comput. Complex..
[22] Eike Kiltz,et al. Generalised key delegation for hierarchical identity-based encryption , 2008, IET Inf. Secur..
[23] Michael Mitzenmacher,et al. Distance-Sensitive Bloom Filters , 2006, ALENEX.
[24] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[25] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[26] M. Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.
[27] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[28] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[29] Ed Dawson,et al. Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings , 2007, ACISP.
[30] Alexandr Andoni,et al. Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).