Acknowledgement
이 논문은 2021년 해군사관학교 해양연구소 학술연구과제 연구비의 지원으로 수행된 연구임.
References
- A. Bechrer, "Hadoop Security Design Just add Kerberos? Really?", iSEC PARTNER, 2010.
- O. O. Malley, K. Zhang, S. Radia, R. Marti and C. Harrel, "Hadoop Security Design", Yahoo, Incorporated, Technical Report, 2009.
- B. Chor, E. Kushilevitz, O. Goldreich and M. Sudan, "Private Information Retrieval", Journal of the ACM, Vol. 45, No. 6, pp. 956-981, 1998.
- D. Boneh, E. Kushilevitz, R. Ostrovsk and W. E. Skeith, "Public Key Encryption that Allows PIR Queries", CRYPTO 2007, Vol. 4622, pp. 50-67, 2007.
- H. Avni, S. Dolev, N. Gilboa and X. Li, "SSSDB: Database with Private Information Search", International Workshop on Algorithmic Aspects of Cloud Computing, Vol. 9511, pp.49-61, 2015.
- D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searches on Encrypted Data", Proceeding of IEEE Symposium on Security and Privacy, pp. 44-55, 2000.
- J. Benaloh, M. Chase, E. Horvitz, and K.Lauter, "Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records", Proceeding of the ACM Workshop on Cloud Computing Security, pp.103-114, 2009.
- Q. Liu, G. Wang and J. Wu, "Secure and Privacy Preserving Keyword Searching for Cloud Storage Services", Journal of network and computer applications, Vol. 35, pp. 927-933, 2012. https://doi.org/10.1016/j.jnca.2011.03.010
- K. Pasupuleti, S. Ramalingam, and R. Buyya, "An Efficient and Secure Privacy-preserving Approach for Outsourced Data of Resource Constrained Mobile Devices in Cloud Computing", Journal of network and computer applications, vol. 64, pp. 12-22, 2016. https://doi.org/10.1016/j.jnca.2015.11.023
- S. Gajek, "Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption", Proceeding of CT-RSA 2016, Vol. 9610, pp. 75-89, 2016.
- M. Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully homomorphic encryption over the integers", Proceeding of EUROCRYPT 2010, Vol. 6110, pp. 24-43, 2010.
- Z. Brakerski, "Fully homomorphic encryption without modulus switching from classical GapSVP", Proceeding of CRYPTO 2012, Vol. 7417, pp. 868-886, 2012.
- Z. Brakerski, C. Gentry, and S. Halevi, "Packed ciphertexts in LWE-based homomorphic encryption", Proceeding of PKC 2013, Vol. 7778, pp. 1-13. 2013.
- Z. Brakerski and V. Vaikuntanathan, "Fully homomorphic encryption from Ring-LWE and security for key dependent messages", Proceeding of CRYPTO 2011, Vol. 6841, pp. 505-524, 2011.
- T. Krovetz and P. Rogaway, "The software performance of authenticated-encryption modes", Proceeding of Fast Software Encryption, Vol. 6733, pp. 306-327, 2011.
- P. Rogaway, M. Bellare, and J. Black, "OCB: A block-cipher mode of operation for efficient authenticated encryption", ACM Transaction on Information and System Security, pp. 365-403, 2003. https://doi.org/10.1145/937527.937529
- C. Joo, A. Yun, "Homomorphic authenticated encryption secure against chosen-ciphertext attack", International Conference on the Theory and Application of Cryptology and Information Security. pp. 173-192, 2014.
- J. Cheon, K. Han, S. Hong, H. Kim, J. Kim, Y. Song, "Toward a secure drone system: Flying with real-time homomorphic authenticated encryption", IEEE access, Vol. 6, pp.24325-24339, 2018. https://doi.org/10.1109/access.2018.2819189
- P. Struck, L. Schabhuser, D. Demirel, J. Buchmann, "Linearly homomorphic authenticated encryption with provable correctness and public verifiability", International Conference on Codes, Cryptology and Information Security, pp.142-160, 2017.
- M. Bellare and C. Namprempre, "Authenticated encryption: Relations among notions and analysis of the generic composition paradigm", Journal of Cryptology, pp. 469-491, 2008. https://doi.org/10.1007/s00145-008-9026-x