Private similarity searchable encryption for Euclidean distance
暂无分享,去创建一个
Goichiro Hanaoka | Takahiro Matsuda | Nuttapong Attrapadung | Natsume Matsuzaki | Shota Yamada | Yuji Unagami
[1] 大沢 哲,et al. Development of "SYNAPSE Case Match", Content-based Image Retrieval System for Supporting Image Diagnosis , 2013 .
[2] Wenliang Du,et al. Protocols for Secure Remote Database Access with Approximate Matching , 2001, E-Commerce Security and Privacy.
[3] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[4] Sven Laur,et al. On Private Similarity Search Protocols , 2004 .
[5] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[6] Tatsuaki Okamoto,et al. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..
[7] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[8] Fuchun Guo,et al. Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption , 2016, IEEE Trans. Inf. Forensics Secur..
[9] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[10] Allison Bishop,et al. Function-Hiding Inner Product Encryption , 2015, ASIACRYPT.
[11] Attila A. Yavuz,et al. Lattice-Based Public Key Encryption with Keyword Search , 2017, IACR Cryptol. ePrint Arch..
[12] Francisco Rodríguez-Henríquez,et al. Software Implementation of an Attribute-Based Encryption Scheme , 2015, IEEE Transactions on Computers.
[13] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[14] Sourav Mukhopadhyay,et al. Functional Encryption for Inner Product with Full Function Privacy , 2016, Public Key Cryptography.
[15] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[16] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[17] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[18] Angelo De Caro,et al. Simple Functional Encryption Schemes for Inner Products , 2015, IACR Cryptol. ePrint Arch..
[19] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..