1 |
R. Ostrovsky, "Efficient computation on oblivious RAMs," in Proc. of 22nd Annual ACM Symposium on Theory of Computing, pp.514-523, May 13-17, 1990.
|
2 |
O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious RAMs," Journal of the ACM, 43(3), pp.431-473, May, 1996.
DOI
ScienceOn
|
3 |
D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. of IEEE Symposium on Security and Privacy 2000, pp. 44-55, May 14-17, 2000.
|
4 |
E.-J. Goh, "Secure indexes," Cryptology ePrint Archive 2003/216, 2003.
|
5 |
S. Bellovin and W. Cheswick, "Privacy-enhanced searches using encrypted Bloom filters," Cryptology ePrint Archive 2004/022, 2004.
|
6 |
Y. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," in Proc. of Applied Cryptography and Network Security Conference (ACNS), pp. 442-455 June 7-10, 2005.
|
7 |
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," in Proc. of ACM CCS 06, pp. 79-88, October 30 - November 3, 2006.
|
8 |
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Proc. of Eurocrypt 2004, pp. 506-522, May 2-6, 2004.
|
9 |
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, "Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions," in Proc. of Crypto 2005, pp. 205-222, August 14-18, 2005.
|
10 |
P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. Applied Cryptography and Network Security Conference (ACNS), pp. 31-45, June 8-11, 2004.
|
11 |
L. Ballard, S. Kamara, and F. Monrose, "Achieving efficient conjunctive keyword searches over encrypted data," in Proc. of ICICS 2005, pp. 414-426, December 6-9, 2005.
|
12 |
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Proc. of TCC 2007, pp. 535-554, February 21-24, 2007.
|
13 |
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, "Highly-scalable searchable symmetric encryption with support for Boolean queries," IACR ePrint Cryptography Archive 2013/169, 2013.
|
14 |
1990 US census data, http://kdd.ics.uci.edu .
|