References
- R. Curtmola et al., "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," 13th ACM Conf. Comput. Commun. Security, 2006.
- Y.C. Chang and M. Mitzenmacher, "Privacy Preserving Keyword Searches on Remote Encrypted Data," Applied Cryptography Netw. Security Conf., 2005.
- Z. Yang, S. Zhong, and R. Wright, "Privacy-Preserving Queries on Encrypted Data," 11th European Symposium Research in Security, 2006.
- M. Kantarcioglu and C. Clifton, "Security Issues in Querying Encrypted Data," Purdue Computer Science Technical Report 04- 013, 2004.
- M. Abdalla et al., "Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions," Crypto, 2005.
- D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searches on Encrypted Data," Proc. IEEE Symp. Security Privacy, 2000, pp. 44-55.
- O. Goldreich and R. Ostrovsky, "Software Protection and Simulation on Oblivious RAMs," J. ACM, vol. 43, no. 3, 1996, pp. 431-473
- B. Chor et al., "Private Information Retrieval," J. ACM, vol. 45, no. 6, 1998, pp. 965-982.
- S.W. Smith and D. Safford, "Practical Private Information Retrieval with Secure Coprocessors," IBM Research Report, RC 21806, 2000.
- R. Ostrovsky and W.E. Skeith, "A Survey of Single-Database Private Information Retrieval: Techniques and Applications," LNCS, vol. 4450, 2007, pp. 393-411.
- Q. Chai and G. Gondm, "Verifiable Symmetric Searchable Encryption for Semi-Honest-but-Curious Cloud Servers." http://www.cacr.math.uwaterloo.ca/techreports/2011/cacr2011- 22.pdf
- E. Shi et al., "Multi-Dimensional Range Query over Encrypted Data," Proc. IEEE Symp. Security Privacy, 2007, pp. 350-364.
- H. Pang and K.L. Tan, "Verifying Completeness of Relational Query Answers from Online Servers," ACM Trans. Inf. Syst. Security, vol. 11, no. 2, article 9, May 2008.
- M. Abdalla et al., "Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, End Extensions," Proc. Adv. Cryptology, LNCS, vol. 3621, 2005, pp. 205-222.
- J. Bethencourt, D. Song, and B. Waters, "New Techniques for Private Stream Searching," ACM Trans. Inf. Syst. Security, vol. 12, no. 3, article 16, Jan. 2009.
- P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," Proc. Adv. Cryptology: EUROCRYPT, LNCS, vol. 1592, 1999, pp. 232-238.
- H. Pang, J. Shen, and R. Krishnan, "Privacy-Preserving Similarity-Based Text Retrieval," ACM Trans. Internet Technol., vol. 10, no. 1, article 4, Feb. 2010.
- C. Wang et al., "Secure Ranked Keyword Search over Encrypted Cloud Data," Proc. Int. Conf. Distrib. Comput. Syst., 2010, pp. 253-262.
- N. Cao et al., "Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data," Proc. IEEE INFOCOM, 2011, pp. 829-837.
- A. Boldyreva et al., "Order-Preserving Symmetric Encryption," Proc. Eurocrypt, LNCS, vol. 5479, 2009, pp. 224-241.
- H. Pang, J. Zhang, and K. Mouratidis, "Scalable Verification for Outsourced Dynamic Databases," Proc. 35th VLDB Conf., Aug. 2009, pp. 802-813.
- S. Papadopoulos, W. Cheng, and K.L. Tan, "Separating Authentication from Query Execution in Outsourced Databases," Proc. 25th Int. Conf. Data Eng., Apr. 2009, pp. 1148-1151.
- R. Gennaro, C. Gentry, and B. Parno, "Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers," Proc. Adv. Cryptology: CRYPTO, 2010, pp. 465-482.
- C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices," Proc. 41st Annual ACM Symp. Theory Comput., 2009,pp. 169-178.
- M. Dijk et al., "Fully Homomorphic Encryption over the Integers," Proc. Adv. Cryptology: EUROCRYPT, 2010, pp. 24- 43.
- A. Joux, "A One Round Protocol for Tripartite Diffie-Hellman," Proc. Algorithmic Number Theory, LNCS, vol. 1838, 2000, pp. 385-393.
Cited by
- Symmetric searchable encryption with efficient range query using multi-layered linked chains vol.72, pp.11, 2012, https://doi.org/10.1007/s11227-015-1497-6