-
1
-
-
84863338303
-
Two Can Keep A Secret: A Distributed Architecture for Secure Database Services
-
G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, and Y. Xu. Two Can Keep A Secret: A Distributed Architecture for Secure Database Services. In Conference on Innovative Data Systems Research (CIDR 2005), pages 186–199, 2005.
-
(2005)
Conference on Innovative Data Systems Research (CIDR 2005)
, pp. 186-199
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
2
-
-
35048875418
-
Secure Computation of the kth-Ranked Element
-
Springer
-
G. Aggarwal, N. Mishra, and B. Pinkas. Secure Computation of the kth-Ranked Element. In EUROCRYPT 2004, LNCS 3027, pages 40–55. Springer, 2004.
-
(2004)
EUROCRYPT 2004, LNCS 3027
, pp. 40-55
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
3
-
-
33749642794
-
Sovereign Joins
-
page IEEE Computer Society
-
R. Agrawal, D. Asonov, M. Kantarcioglu, and Y. Li. Sovereign Joins. In ICDE 2006, page 26. IEEE Computer Society, 2006.
-
(2006)
ICDE 2006
, pp. 26
-
-
Agrawal, R.1
Asonov, D.2
Kantarcioglu, M.3
Li, Y.4
-
6
-
-
38149068986
-
Deterministic and Efficiently Searchable Encryption
-
Springer
-
M. Bellare, A. Boldyreva, and A. O’Neill. Deterministic and Efficiently Searchable Encryption. In CRYPTO, LNCS 4622, pages 535–552. Springer, 2007.
-
(2007)
CRYPTO, LNCS
, vol.4622
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O’Neill, A.3
-
7
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
-
M. Bellare and P. Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In CCS 1993, pages 62–73, 1993.
-
(1993)
CCS 1993
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
35048901123
-
Public Key Encryption with Keyword Search
-
Springer
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. Public Key Encryption with Keyword Search. In EUROCRYPT 2004, LNCS 3027, pages 506–522. Springer, 2004.
-
(2004)
EUROCRYPT 2004, LNCS 3027
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G. D.2
Ostrovsky, R.3
Persiano, G.4
-
9
-
-
24144433396
-
Evaluating 2-DNF Formulas on Ciphertexts
-
D. Boneh, E.-J. Goh, and K. Nissim. Evaluating 2-DNF Formulas on Ciphertexts. In TCC 2005, pages 325–341, 2005.
-
(2005)
TCC 2005
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
11
-
-
33750696320
-
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data
-
Springer
-
J. W. Byun, H. S. Rhee, H.-A. Park, and D. H. Lee. Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. In Secure Data Management, LNCS 4165, pages 75–83. Springer, 2006.
-
(2006)
Secure Data Management, LNCS 4165
, pp. 75-83
-
-
Byun, J. W.1
Rhee, H. S.2
Park, H.-A.3
Lee, D. H.4
-
12
-
-
24144481228
-
A Verifiable Random Function with Short Proofs and Keys
-
Springer
-
Y. Dodis and A. Yampolskiy. A Verifiable Random Function with Short Proofs and Keys. In PKC 2005, LNCS 3386, pages 416–431. Springer, 2005.
-
(2005)
PKC 2005, LNCS 3386
, pp. 416-431
-
-
Dodis, Y.1
Yampolskiy, A.2
-
13
-
-
33749610153
-
Privacy Preserving Query Processing Using Third Parties
-
page IEEE Computer Society
-
F. Emekçi, D. Agrawal, A. E. Abbadi, and A. Gulbeden. Privacy Preserving Query Processing Using Third Parties. In ICDE 2006, page 27. IEEE Computer Society, 2006.
-
(2006)
ICDE 2006
, pp. 27
-
-
Emekçi, F.1
Agrawal, D.2
Abbadi, A. E.3
Gulbeden, A.4
-
15
-
-
24144488603
-
Keyword Search and Oblivious Pseudorandom Functions
-
M. J. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword Search and Oblivious Pseudorandom Functions. In TCC 2005, pages 303–324, 2005.
-
(2005)
TCC 2005
, pp. 303-324
-
-
Freedman, M. J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
16
-
-
35048820609
-
Efficient Private Matching and Set Intersection
-
Springer
-
M. J. Freedman, K. Nissim, and B. Pinkas. Efficient Private Matching and Set Intersection. In EUROCRYPT 2004, LNCS 3027, pages 1–19. Springer, 2004.
-
(2004)
EUROCRYPT 2004, LNCS 3027
, pp. 1-19
-
-
Freedman, M. J.1
Nissim, K.2
Pinkas, B.3
-
19
-
-
0023545076
-
How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority
-
ACM
-
O. Goldreich, S. Micali, and A. Wigderson. How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. In STOC 1987, pages 218–229. ACM, 1987.
-
(1987)
STOC 1987
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
20
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof Systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM J. Comput., 18(1):186–208, 1989.
-
(1989)
SIAM J. Comput
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
21
-
-
40249108370
-
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
-
C. Hazay and Y. Lindell. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In TCC 2008, pages 155–175, 2008.
-
(2008)
TCC 2008
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
22
-
-
84955565977
-
A Proposed Architecture for Trusted Third Party Services
-
Springer
-
N. Jefferies, C. J. Mitchell, and M. Walker. A Proposed Architecture for Trusted Third Party Services. In Cryptography: Policy and Algorithms, LNCS 1029, pages 98–104. Springer, 1995.
-
(1995)
Cryptography: Policy and Algorithms, LNCS 1029
, pp. 98-104
-
-
Jefferies, N.1
Mitchell, C. J.2
Walker, M.3
-
23
-
-
38049094878
-
Privacy-Preserving Set Operations
-
Springer
-
L. Kissner and D. X. Song. Privacy-Preserving Set Operations. In CRYPTO 2005, LNCS 3621, pages 241–257. Springer, 2005.
-
(2005)
CRYPTO 2005, LNCS 3621
, pp. 241-257
-
-
Kissner, L.1
Song, D. X.2
-
24
-
-
33746437508
-
Privacy Preserving Data Mining
-
Y. Lindell and B. Pinkas. Privacy Preserving Data Mining. J. Cryptology, 15(3):177–206, 2002.
-
(2002)
J. Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
26
-
-
85104009590
-
On Security of Sovereign Joins
-
Cryptology ePrint Archive, Report 2006/380
-
E. Mykletun and G. Tsudik. On Security of Sovereign Joins. Cryptology ePrint Archive, Report 2006/380, 2006.
-
(2006)
-
-
Mykletun, E.1
Tsudik, G.2
-
27
-
-
84883898504
-
Privacy Preserving Auctions and Mechanism Design
-
ACM
-
M. Naor, B. Pinkas, and R. Sumner. Privacy Preserving Auctions and Mechanism Design. In Electronic Commerce 1999, pages 129–139. ACM, 1999.
-
(1999)
Electronic Commerce 1999
, pp. 129-139
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
29
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Springer
-
P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In EUROCRYPT 99, LNCS 1592, pages 223–238. Springer, 1999.
-
(1999)
EUROCRYPT 99, LNCS 1592
, pp. 223-238
-
-
Paillier, P.1
-
30
-
-
0034782005
-
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications
-
I. Stoica, R. Morris, D. R. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In SIG-COMM 2001, pages 149–160, 2001.
-
(2001)
SIG-COMM 2001
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D. R.3
Kaashoek, M. F.4
Balakrishnan, H.5
-
31
-
-
24944492255
-
Mariposa: A Wide-Area Distributed Database System
-
M. Stonebraker, P. M. Aoki, W. Litwin, A. Pfeffer, A. Sah, J. Sidell, C. Staelin, and A. Yu. Mariposa: A Wide-Area Distributed Database System. VLDB J., 5(1):48–63, 1996.
-
(1996)
VLDB J
, vol.5
, Issue.1
, pp. 48-63
-
-
Stonebraker, M.1
Aoki, P. M.2
Litwin, W.3
Pfeffer, A.4
Sah, A.5
Sidell, J.6
Staelin, C.7
Yu, A.8
-
32
-
-
28444436573
-
Privacy-Preserving Top-K Queries
-
IEEE Computer Society
-
J. Vaidya and C. Clifton. Privacy-Preserving Top-K Queries. In ICDE 2005, pages 545–546. IEEE Computer Society, 2005.
-
(2005)
ICDE 2005
, pp. 545-546
-
-
Vaidya, J.1
Clifton, C.2
|