Private Compound Wildcard Queries Using Fully Homomorphic Encryption
暂无分享,去创建一个
[1] Takeshi Koshiba,et al. Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption , 2014, ACISP.
[2] Berk Sunar,et al. Depth Optimized Efficient Homomorphic Sorting , 2015, LATINCRYPT.
[3] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[4] Yehuda Lindell,et al. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries , 2008, Journal of Cryptology.
[5] L. Dagum,et al. OpenMP: an industry standard API for shared-memory programming , 1998 .
[6] Pieter H. Hartel,et al. Searching Keywords with Wildcards on Encrypted Data , 2010, SCN.
[7] Martin R. Albrecht,et al. On the concrete hardness of Learning with Errors , 2015, J. Math. Cryptol..
[8] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[9] Gizem S. Cetin,et al. Private queries on encrypted genomic data , 2017, BMC Medical Genomics.
[10] Michael Naehrig,et al. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme , 2013, IMACC.
[11] Takeshi Koshiba,et al. Secure pattern matching using somewhat homomorphic encryption , 2013, CCSW.
[12] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[13] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[14] Myungsun Kim,et al. On the Efficiency of FHE-Based Private Queries , 2016, IEEE Transactions on Dependable and Secure Computing.
[15] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[16] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[17] Edward M. McCreight,et al. A Space-Economical Suffix Tree Construction Algorithm , 1976, JACM.
[18] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[19] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[20] Craig Gentry,et al. Private Database Access with HE-over-ORAM Architecture , 2015, ACNS.
[21] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[22] Jonathan Katz,et al. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption , 2016, USENIX Security Symposium.
[23] Rafail Ostrovsky,et al. 5PM: Secure pattern matching , 2012, J. Comput. Secur..
[24] Keith B. Frikken. Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation , 2009, DBSec.
[25] Takeshi Koshiba,et al. An Enhancement of Privacy-Preserving Wildcards Pattern Matching , 2016, FPS.
[26] Craig Gentry,et al. Private Database Queries Using Somewhat Homomorphic Encryption , 2013, ACNS.
[27] Jonathan Katz,et al. Secure text processing with applications to private DNA matching , 2010, CCS '10.
[28] Hugo Krawczyk,et al. Rich Queries on Encrypted Data: Beyond Exact Matches , 2015, ESORICS.
[29] Hugo Krawczyk,et al. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation , 2014, NDSS.
[30] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[31] Frederik Vercauteren,et al. Fully homomorphic SIMD operations , 2012, Designs, Codes and Cryptography.
[32] Melissa Chase,et al. Substring-Searchable Symmetric Encryption , 2015, Proc. Priv. Enhancing Technol..
[33] Samuel Madden,et al. Processing Analytical Queries over Encrypted Data , 2013, Proc. VLDB Endow..
[34] Jung Hee Cheon,et al. Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data , 2016, IEEE Transactions on Information Forensics and Security.
[35] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[36] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[37] M. Crochemore,et al. On-line construction of suffix trees , 2002 .
[38] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[39] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.