FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
暂无分享,去创建一个
Ming Li | Li Xiong | Boyang Wang | Li Xiong | Boyang Wang | Ming Li
[1] Hugo Krawczyk,et al. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation , 2014, NDSS.
[2] Paolo Gasti,et al. Privacy-preserving distance computation and proximity testing on earth, done right , 2014, AsiaCCS.
[3] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[5] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[6] Jonathan Katz,et al. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption , 2016, USENIX Security Symposium.
[7] Nickolai Zeldovich,et al. An Ideal-Security Protocol for Order-Preserving Encoding , 2013, 2013 IEEE Symposium on Security and Privacy.
[8] Ming Li,et al. Circular range search on encrypted spatial data , 2015, CNS.
[9] Wenliang Du,et al. Secure Multi-party Computational Geometry , 2001, WADS.
[10] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[11] Marios Hadjieleftheriou,et al. R-Trees - A Dynamic Index Structure for Spatial Searching , 2008, ACM SIGSPATIAL International Workshop on Advances in Geographic Information Systems.
[12] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[13] Cheng Huang,et al. An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud , 2016, IEEE Transactions on Vehicular Technology.
[14] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[15] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[16] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[17] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[18] Yantian Hou,et al. Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index , 2014, AsiaCCS.
[19] Murat Kantarcioglu,et al. Efficient privacy-aware search over encrypted databases , 2014, CODASPY '14.
[20] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[21] Yanbin Lu,et al. Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud , 2012, NDSS.
[22] David Cash,et al. Leakage-Abuse Attacks Against Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[23] Gabriel Ghinita,et al. An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical , 2014, CODASPY '14.
[24] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[25] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[26] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[27] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[28] Haitao Wang,et al. Geometric Range Search on Encrypted Spatial Data , 2016, IEEE Transactions on Information Forensics and Security.
[29] Elaine Shi,et al. Practical Dynamic Searchable Encryption with Small Leakage , 2014, NDSS.
[30] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.