Research on oblivious keyword search protocols with CKA security
暂无分享,去创建一个
[1] Kaoru Kurosawa,et al. Oblivious keyword search , 2004, J. Complex..
[2] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[3] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[4] Feng Bao,et al. Oblivious Keyword Search Protocols in the Public Database Model , 2007, 2007 IEEE International Conference on Communications.
[5] Xiao Li,et al. (t,p)-Threshold Point Function Secret Sharing Scheme Based on Polynomial Interpolation and Its Application , 2016, 2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC).
[6] Fuchun Guo,et al. A New General Framework for Secure Public Key Encryption with Keyword Search , 2015, ACISP.
[7] Bo Zhang,et al. An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..
[8] S. Sitharama Iyengar,et al. Data-Driven Techniques in Disaster Information Management , 2017, ACM Comput. Surv..
[9] Peng Jiang,et al. Oblivious Keyword Search with Authorization , 2016, ProvSec.
[10] Geong Sen Poh,et al. Searchable Symmetric Encryption , 2017, ACM Comput. Surv..
[11] Willy Susilo,et al. A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle , 2009, CANS.
[12] Rafail Ostrovsky,et al. Batch codes and their applications , 2004, STOC '04.
[13] Chanathip Namprempre,et al. The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme , 2003, Journal of Cryptology.
[14] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[15] Ivan Damgård,et al. Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation , 2004, TCC.
[16] Ahmed El-Yahyaoui,et al. Fully homomorphic encryption: Searching over encrypted cloud data , 2017, BDCA'17.
[17] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.
[18] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.