Sorting and Searching Behind the Curtain
暂无分享,去创建一个
[1] Murat Kantarcioglu,et al. A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[2] P. Vishvapathi,et al. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .
[3] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[4] Indrajit Ray,et al. Multi-keyword Similarity Search Over Encrypted Cloud Data , 2014, IACR Cryptol. ePrint Arch..
[5] Hinrich Schütze,et al. Introduction to information retrieval , 2008 .
[6] I. C. Mogotsi,et al. Christopher D. Manning, Prabhakar Raghavan, and Hinrich Schütze: Introduction to information retrieval , 2010, Information Retrieval.
[7] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[8] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[9] Kristján Valur Jónsson,et al. Secure Multi-Party Sorting and Applications , 2011, IACR Cryptol. ePrint Arch..
[10] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[11] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[12] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[13] Jonathan Katz,et al. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? , 2012, NDSS.
[14] Olga Ohrimenko,et al. Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data , 2014, IACR Cryptol. ePrint Arch..
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[16] E. Szemerédi,et al. O(n LOG n) SORTING NETWORK. , 1983 .
[17] Helger Lipmaa,et al. An Oblivious Transfer Protocol with Log-Squared Communication , 2005, ISC.
[18] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[19] Mihir Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.
[20] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[21] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[22] Donald E. Knuth,et al. Sorting and Searching , 1973 .
[23] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[24] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[25] János Komlós,et al. An 0(n log n) sorting network , 1983, STOC.
[26] Ivan Damgård,et al. Homomorphic encryption and secure comparison , 2008, Int. J. Appl. Cryptogr..
[27] Donald E. Knuth,et al. The art of computer programming: sorting and searching (volume 3) , 1973 .
[28] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.
[29] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[30] Donald E. Knuth,et al. The Art of Computer Programming: Volume 3: Sorting and Searching , 1998 .
[31] Erkay Savas,et al. An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking , 2014, Distributed and Parallel Databases.
[32] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.
[33] JUSTIN ZOBEL,et al. Inverted files for text search engines , 2006, CSUR.
[34] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[35] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[36] Erkay Savas,et al. Efficient and secure ranked multi-keyword search on encrypted cloud data , 2012, EDBT-ICDT '12.
[37] Ahmad-Reza Sadeghi,et al. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..
[38] Michael T. Goodrich,et al. Privacy-preserving group data access via stateless oblivious RAM simulation , 2011, SODA.
[39] Ivan Damgård,et al. A correction to 'efficient and secure comparison for on-line auctions' , 2009, Int. J. Appl. Cryptogr..
[40] Charalampos Papamanthou,et al. CS2: A Searchable Cryptographic Cloud Storage System , 2011 .
[41] Ben Adida,et al. How to Shuffle in Public , 2007, TCC.
[42] Ian F. Blake,et al. Strong Conditional Oblivious Transfer and Computing on Intervals , 2004, ASIACRYPT.
[43] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[44] Donald E. Knuth,et al. The art of computer programming, volume 3: (2nd ed.) sorting and searching , 1998 .
[45] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[46] Yehuda Lindell,et al. More efficient oblivious transfer and extensions for faster secure computation , 2013, CCS.
[47] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[48] Mihir Bellare,et al. Efficient Garbling from a Fixed-Key Blockcipher , 2013, 2013 IEEE Symposium on Security and Privacy.
[49] Melissa Chase,et al. Structured Encryption and Controlled Disclosure , 2010, IACR Cryptol. ePrint Arch..
[50] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[51] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[52] Kenneth E. Batcher,et al. Sorting networks and their applications , 1968, AFIPS Spring Joint Computing Conference.