Research on oblivious keyword search protocols with CKA security

[1]  Kaoru Kurosawa,et al.  Oblivious keyword search , 2004, J. Complex..

[2]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[3]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[4]  Feng Bao,et al.  Oblivious Keyword Search Protocols in the Public Database Model , 2007, 2007 IEEE International Conference on Communications.

[5]  Xiao Li,et al.  (t,p)-Threshold Point Function Secret Sharing Scheme Based on Polynomial Interpolation and Its Application , 2016, 2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC).

[6]  Fuchun Guo,et al.  A New General Framework for Secure Public Key Encryption with Keyword Search , 2015, ACISP.

[7]  Bo Zhang,et al.  An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..

[8]  S. Sitharama Iyengar,et al.  Data-Driven Techniques in Disaster Information Management , 2017, ACM Comput. Surv..

[9]  Peng Jiang,et al.  Oblivious Keyword Search with Authorization , 2016, ProvSec.

[10]  Geong Sen Poh,et al.  Searchable Symmetric Encryption , 2017, ACM Comput. Surv..

[11]  Willy Susilo,et al.  A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle , 2009, CANS.

[12]  Rafail Ostrovsky,et al.  Batch codes and their applications , 2004, STOC '04.

[13]  Chanathip Namprempre,et al.  The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme , 2003, Journal of Cryptology.

[14]  Moni Naor,et al.  Oblivious transfer and polynomial evaluation , 1999, STOC '99.

[15]  Ivan Damgård,et al.  Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation , 2004, TCC.

[16]  Ahmed El-Yahyaoui,et al.  Fully homomorphic encryption: Searching over encrypted cloud data , 2017, BDCA'17.

[17]  Brent Waters,et al.  Building an Encrypted and Searchable Audit Log , 2004, NDSS.

[18]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.