메뉴 건너뛰기




Volumn 20, Issue 4, 2007, Pages 397-430

Private searching on streaming data

Author keywords

Code obfuscation; Crypto computing; Database security; Privacy preserving keyword search; Private information retrieval; Program obfuscation; Public key encryption with special properties; Public key program obfuscation; Software security

Indexed keywords

CODE OBFUSCATION; DATA STREAMING; PRIVATE SEARCHING; PROGRAM COMPUTATION;

EID: 36749033301     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/s00145-007-0565-3     Document Type: Article
Times cited : (58)

References (29)
  • 2
    • 0017930809 scopus 로고    scopus 로고
    • L. Adleman, R. Rivest, and A. Shamir. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM, 21(2):120-126 (February, 1978).
    • L. Adleman, R. Rivest, and A. Shamir. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM, 21(2):120-126 (February, 1978).
  • 3
    • 79251578513 scopus 로고    scopus 로고
    • On the (Im)Possibility of Software Obfuscation
    • Crypto, Springer, Berlin
    • B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (Im)Possibility of Software Obfuscation. In Crypto 2001, pages 1-18. LNCS 2139. Springer, Berlin, 2001.
    • (2001) LNCS , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.6    Yang, K.7
  • 4
    • 33751062464 scopus 로고    scopus 로고
    • New Techniques for Private Stream Searching
    • Technical Report CMU-CS-06-106, Carnegie Mellon University, March
    • J. Bethencourt, D. Song, and B. Waters. New Techniques for Private Stream Searching. Technical Report CMU-CS-06-106, Carnegie Mellon University, March 2006.
    • (2006)
    • Bethencourt, J.1    Song, D.2    Waters, B.3
  • 5
    • 36749060176 scopus 로고    scopus 로고
    • J. Bethencourt, D. Song, and B. Waters. New Constructions and Practical Applications for Private Stream. Searching (Extended Abstract) Appeared at http://www.cs.cmu.edu/ bethenco/searcheff.pdf July, 2006.
    • J. Bethencourt, D. Song, and B. Waters. New Constructions and Practical Applications for Private Stream. Searching (Extended Abstract) Appeared at http://www.cs.cmu.edu/ bethenco/searcheff.pdf July, 2006.
  • 6
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF Formulas on Ciphertexts
    • D. Boneh, E. Goh, and K. Nissim. Evaluating 2-DNF Formulas on Ciphertexts. In TCC, pages 325-341, 2005.
    • (2005) TCC , pp. 325-341
    • Boneh, D.1    Goh, E.2    Nissim, K.3
  • 8
    • 33751035759 scopus 로고    scopus 로고
    • Single Database Private Information Retrieval with Logarithmic Communication
    • Y. C. Chang. Single Database Private Information Retrieval with Logarithmic Communication. In ACISP, 2004.
    • (2004) ACISP
    • Chang, Y.C.1
  • 9
    • 1642602228 scopus 로고    scopus 로고
    • Computationally Private Information Retrieval with Polylogarithmic Communication
    • J. Stern, editor, Advances in Cryptology, EUROCRYPT '99, Springer, Berlin
    • C. Cachin, S. Micali, and M. Stadler. Computationally Private Information Retrieval with Polylogarithmic Communication. In J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, pages 402-414. LNCS 1592. Springer, Berlin, 1999.
    • (1999) LNCS , vol.1592 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 10
    • 0003701129 scopus 로고    scopus 로고
    • Private Information Retrieval by Keywords. Technical Report TR CS0917, Department of Computer Science
    • B. Chor, N. Gilboa, and M. Naor. Private Information Retrieval by Keywords. Technical Report TR CS0917, Department of Computer Science, Technion, 1998.
    • (1998) Technion
    • Chor, B.1    Gilboa, N.2    Naor, M.3
  • 12
    • 36749094148 scopus 로고    scopus 로고
    • Journal version
    • Journal version: J. ACM, 45:965-981, 1998.
    • (1998) J. ACM , vol.45 , pp. 965-981
  • 13
    • 0002908662 scopus 로고    scopus 로고
    • A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
    • I. Damgård and M. Jurik. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In Public Key Cryptography (PKC 2001).
    • (2001) Public Key Cryptography (PKC
    • Damgård, I.1    Jurik, M.2
  • 14
    • 36749037915 scopus 로고    scopus 로고
    • Improving the Decoding Efficiency of Private Search
    • G. Danezis and C. Diaz Improving the Decoding Efficiency of Private Search. IACR Eprint archive number 024, 2006.
    • (2006) IACR Eprint archive , Issue.24
    • Danezis, G.1    Diaz, C.2
  • 16
    • 0002302934 scopus 로고
    • On the Size of Seperarting Systems and Families of Perfect Hash Functions
    • March
    • M. Fredman and J. Komlós. On the Size of Seperarting Systems and Families of Perfect Hash Functions. SIAM J. Algebraic Discrete Methods, 5(1):61-68, March 1984.
    • (1984) SIAM J. Algebraic Discrete Methods , vol.5 , Issue.1 , pp. 61-68
    • Fredman, M.1    Komlós, J.2
  • 17
    • 36749004462 scopus 로고    scopus 로고
    • M. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword Search and Oblivious Pseudorandom Functions. To appear in Proc. 2nd Theory of Cryptography Conference (TCC '05) Cambridge, MA, Feb. 2005.
    • M. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword Search and Oblivious Pseudorandom Functions. To appear in Proc. 2nd Theory of Cryptography Conference (TCC '05) Cambridge, MA, Feb. 2005.
  • 20
    • 1942420748 scopus 로고    scopus 로고
    • K. Kurosawa and W. Ogata. Oblivious Keyword Search. J. Complexity, 20(2-3):356-371, April/June 2004. Special issue on coding and cryptography.
    • K. Kurosawa and W. Ogata. Oblivious Keyword Search. J. Complexity, 20(2-3):356-371, April/June 2004. Special issue on coding and cryptography.
  • 22
    • 36749036810 scopus 로고    scopus 로고
    • E. Kushilevitz and R. Ostrovsky. One-way Trapdoor Permutations Are Sufficient for Non-Trivial Single-Database Computationally-Private Information Retrieval. In Proc. EUROCRYPT '00, 2000.
    • E. Kushilevitz and R. Ostrovsky. One-way Trapdoor Permutations Are Sufficient for Non-Trivial Single-Database Computationally-Private Information Retrieval. In Proc. EUROCRYPT '00, 2000.
  • 23
    • 36749052425 scopus 로고    scopus 로고
    • H. Lipmaa. An Oblivious Transfer Protocol with Log-Squared Communication. IACR ePrint Cryptology Archive 2004/063.
    • H. Lipmaa. An Oblivious Transfer Protocol with Log-Squared Communication. IACR ePrint Cryptology Archive 2004/063.
  • 25
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious Transfer and Polynomial Evaluation
    • M. Naor and B. Pinkas. Oblivious Transfer and Polynomial Evaluation. Proc. 31st STOC, pages 245-254, 1999.
    • (1999) Proc. 31st STOC , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 26
    • 40249101339 scopus 로고    scopus 로고
    • Algebraic Lower Bounds for Computing on Encrypted Data
    • Manuscript
    • R. Ostrovsky and W. Skeith. Algebraic Lower Bounds for Computing on Encrypted Data. Manuscript, 2006.
    • (2006)
    • Ostrovsky, R.1    Skeith, W.2
  • 27
    • 84942550998 scopus 로고    scopus 로고
    • Public Key Cryptosystems Based on Composite Degree Residue Classes
    • Advances in Cryptology, EUROCRYPT '99, Springer-Verlag, Berlin
    • P. Paillier. Public Key Cryptosystems Based on Composite Degree Residue Classes. In Advances in Cryptology - EUROCRYPT '99, pages 223-238. LNCS 1592. Springer-Verlag, Berlin, 1999.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 28
    • 0033309271 scopus 로고    scopus 로고
    • Non-Interactive CryptoComputing For NC1
    • T. Sander, A. Young, and M. Yung. Non-Interactive CryptoComputing For NC1. In Proc. FOCS, pages 554-567, 1999.
    • (1999) Proc. FOCS , pp. 554-567
    • Sander, T.1    Young, A.2    Yung, M.3
  • 29
    • 22444454758 scopus 로고    scopus 로고
    • A New and Efficient All or Nothing Disclosure of Secrets Protocol
    • Springer-Verlag, Berlin
    • J. P. Stern. A New and Efficient All or Nothing Disclosure of Secrets Protocol. In Proc. Asiacrypt. Springer-Verlag, Berlin, 1998.
    • (1998) Proc. Asiacrypt
    • Stern, J.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.