메뉴 건너뛰기




Volumn 7483 LNCS, Issue , 2012, Pages 224-241

Selective document retrieval from encrypted database

Author keywords

Homomorphic Encryption; Privacy; Searchable Encryption

Indexed keywords

DOCUMENT RETRIEVAL; ENCRYPTED DATA; ENCRYPTED DATABASE; FULLY HOMOMORPHIC ENCRYPTION; HOMOMORPHIC-ENCRYPTIONS; INNER PRODUCT; KEYWORD SEARCH; LINUX SERVERS; SEARCH ALGORITHMS; SEARCH QUERIES; SEARCH RESULTS; SEARCH-BASED; SECURITY MODEL;

EID: 84867033179     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-33383-5_14     Document Type: Conference Paper
Times cited : (26)

References (28)
  • 1
    • 35048901123 scopus 로고    scopus 로고
    • Public Key Encryption with Keyword Search
    • Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 2
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF Formulas on Ciphertexts
    • Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
    • Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 3
    • 80051986706 scopus 로고    scopus 로고
    • Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
    • Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
    • Brakerski, Z., Vaikuntanathan, V.: Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505-524. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 505-524
    • Brakerski, Z.1    Vaikuntanathan, V.2
  • 4
    • 33750696320 scopus 로고    scopus 로고
    • Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data
    • Jonker, W., Petković, M. (eds.) SDM 2006. Springer, Heidelberg
    • Byun, J.W., Rhee, H.S., Park, H.-A., Lee, D.-H.: Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75-83. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4165 , pp. 75-83
    • Byun, J.W.1    Rhee, H.S.2    Park, H.-A.3    Lee, D.-H.4
  • 5
    • 26444507272 scopus 로고    scopus 로고
    • Privacy Preserving Keyword Searches on Remote Encrypted Data
    • Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
    • Chang, Y.-C., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3531 , pp. 442-455
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 8
    • 0021467937 scopus 로고
    • Storing a Sparse Table with 0(1) Worst Case Access Time
    • Fredman, M.L., Komlós, J., Szemerédi, E.: Storing a Sparse Table with 0(1) Worst Case Access Time. J. ACM 31(3), 538-544 (1984)
    • (1984) J. ACM , vol.31 , Issue.3 , pp. 538-544
    • Fredman, M.L.1    Komlós, J.2    Szemerédi, E.3
  • 9
    • 77954639466 scopus 로고    scopus 로고
    • Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Freeman, D.M.: Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 44-61. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 44-61
    • Freeman, D.M.1
  • 10
    • 77954628604 scopus 로고    scopus 로고
    • A Simple BGN-Type Cryptosystem from LWE
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Gentry, C., Halevi, S., Vaikuntanathan, V.: A Simple BGN-Type Cryptosystem from LWE. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 506-522. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 506-522
    • Gentry, C.1    Halevi, S.2    Vaikuntanathan, V.3
  • 11
    • 33244488406 scopus 로고    scopus 로고
    • Secure Indexes
    • ePrint Archive, Report 2003/216
    • Goh, E.-J.: Secure Indexes. Cryptology ePrint Archive, Report 2003/216 (2003)
    • (2003) Cryptology
    • Goh, E.-J.1
  • 12
    • 20444449548 scopus 로고    scopus 로고
    • Secure Multi-Party Computation
    • October
    • Goldreich, O.: Secure Multi-Party Computation. Working draft (October 2002)
    • (2002) Working Draft
    • Goldreich, O.1
  • 13
    • 0030149547 scopus 로고    scopus 로고
    • Software Protection and Simulation on Oblivious RAMs
    • Goldreich, O., Ostrovsky, R.: Software Protection and Simulation on Oblivious RAMs. J. ACM 43(3), 431-473 (1996)
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 18
    • 79951793525 scopus 로고    scopus 로고
    • Better Key Sizes (and Attacks) for LWE-Based Encryption
    • Kiayias, A. (ed.) CT-RSA 2011. Springer, Heidelberg
    • Lindner, R., Peikert, C.: Better Key Sizes (and Attacks) for LWE-Based Encryption. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 319-339. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6558 , pp. 319-339
    • Lindner, R.1    Peikert, C.2
  • 20
    • 50249148926 scopus 로고    scopus 로고
    • SWIFFT: A Modest Proposal for FFT Hashing
    • Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
    • Lyubashevsky, V., Micciancio, D., Peikert, C., Rosen, A.: SWIFFT: A Modest Proposal for FFT Hashing. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 54-72. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5086 , pp. 54-72
    • Lyubashevsky, V.1    Micciancio, D.2    Peikert, C.3    Rosen, A.4
  • 22
    • 84857066233 scopus 로고    scopus 로고
    • Revisiting the Computational Practicality of Private Information Retrieval
    • Danezis, G. (ed.) FC 2011. Springer, Heidelberg
    • Olumofin, F., Goldberg, I.: Revisiting the Computational Practicality of Private Information Retrieval. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 158-172. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7035 , pp. 158-172
    • Olumofin, F.1    Goldberg, I.2
  • 25
    • 38049002436 scopus 로고    scopus 로고
    • A Survey of Single-Database Private Information Retrieval: Techniques and Applications
    • Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
    • Ostrovsky, R., Skeith III, W.E.: A Survey of Single-Database Private Information Retrieval: Techniques and Applications. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 393-411. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4450 , pp. 393-411
    • Ostrovsky, R.1    Skeith III, W.E.2
  • 27
    • 70350649061 scopus 로고    scopus 로고
    • Predicate Privacy in Encryption Systems
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Shen, E., Shi, E., Waters, B.: Predicate Privacy in Encryption Systems. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 457-473. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.