Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud
暂无分享,去创建一个
[1] Matthew Smith,et al. How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[2] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[3] Jean-Sébastien Coron,et al. Fully Homomorphic Encryption over the Integers with Shorter Public Keys , 2011, IACR Cryptol. ePrint Arch..
[4] Douglas R. Stinson,et al. Cryptography: Theory and Practice,Second Edition , 2002 .
[5] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[6] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[7] A. Sadeghi,et al. Token-Based Cloud Computing Secure Outsourcing of Data and Arbitrary Computations with Lower Latency , 2010 .
[8] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[9] Olga Ohrimenko,et al. Sorting and Searching Behind the Curtain , 2015, Financial Cryptography.
[10] Ron Steinfeld,et al. Faster Fully Homomorphic Encryption , 2010, ASIACRYPT.
[11] Matthew Smith,et al. Fast confidential search for bio-medical data using Bloom filters and Homomorphic Cryptography , 2012, 2012 IEEE 8th International Conference on E-Science.
[12] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[13] Daniel Slamanig,et al. Cryptography for Security and Privacy in Cloud Computing , 2013 .
[14] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[15] Indranil Sengupta,et al. Accelerating Sorting of Fully Homomorphic Encrypted Data , 2013, INDOCRYPT.
[16] Kaoru Kurosawa,et al. UC-Secure Searchable Symmetric Encryption , 2012, Financial Cryptography.
[17] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[18] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[19] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[20] Matthew Smith,et al. Privacy/performance trade-off in private search on bio-medical data , 2014, Future Gener. Comput. Syst..
[21] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[22] Ahmad-Reza Sadeghi,et al. Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version) , 2011, Communications and Multimedia Security.
[23] Berk Sunar,et al. Low Depth Circuits for Efficient Homomorphic Sorting , 2015, IACR Cryptol. ePrint Arch..
[24] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .
[25] Dongxi Liu,et al. Privacy of outsourced k-means clustering , 2014, AsiaCCS.
[26] Mufutau Akinwande,et al. Advances in Homomorphic Cryptosystems , 2009, J. Univers. Comput. Sci..
[27] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[28] Craig Gentry,et al. Computing arbitrary functions of encrypted data , 2010, CACM.
[29] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[30] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.