-
1
-
-
35048901123
-
Public Key Encryption with Keyword Search
-
Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
2
-
-
24144433396
-
Evaluating 2-DNF Formulas on Ciphertexts
-
Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
3
-
-
80051986706
-
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Brakerski, Z., Vaikuntanathan, V.: Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505-524. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 505-524
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
4
-
-
33750696320
-
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data
-
Jonker, W., Petković, M. (eds.) SDM 2006. Springer, Heidelberg
-
Byun, J.W., Rhee, H.S., Park, H.-A., Lee, D.-H.: Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75-83. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4165
, pp. 75-83
-
-
Byun, J.W.1
Rhee, H.S.2
Park, H.-A.3
Lee, D.-H.4
-
5
-
-
26444507272
-
Privacy Preserving Keyword Searches on Remote Encrypted Data
-
Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
-
Chang, Y.-C., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3531
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
6
-
-
0029541045
-
Private Information Retrieval
-
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private Information Retrieval. In: FOCS 1995: Proceedings of the 36th Annu. IEEE Symposium on Foundations of Computer Science, pp. 41-50 (1995)
-
(1995)
FOCS 1995: Proceedings of the 36th Annu. IEEE Symposium on Foundations of Computer Science
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
7
-
-
34547240272
-
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
-
ACM
-
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. In: CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79-88. ACM (2006)
-
(2006)
CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
8
-
-
0021467937
-
Storing a Sparse Table with 0(1) Worst Case Access Time
-
Fredman, M.L., Komlós, J., Szemerédi, E.: Storing a Sparse Table with 0(1) Worst Case Access Time. J. ACM 31(3), 538-544 (1984)
-
(1984)
J. ACM
, vol.31
, Issue.3
, pp. 538-544
-
-
Fredman, M.L.1
Komlós, J.2
Szemerédi, E.3
-
9
-
-
77954639466
-
Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Freeman, D.M.: Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 44-61. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 44-61
-
-
Freeman, D.M.1
-
10
-
-
77954628604
-
A Simple BGN-Type Cryptosystem from LWE
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Gentry, C., Halevi, S., Vaikuntanathan, V.: A Simple BGN-Type Cryptosystem from LWE. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 506-522. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 506-522
-
-
Gentry, C.1
Halevi, S.2
Vaikuntanathan, V.3
-
11
-
-
33244488406
-
Secure Indexes
-
ePrint Archive, Report 2003/216
-
Goh, E.-J.: Secure Indexes. Cryptology ePrint Archive, Report 2003/216 (2003)
-
(2003)
Cryptology
-
-
Goh, E.-J.1
-
12
-
-
20444449548
-
Secure Multi-Party Computation
-
October
-
Goldreich, O.: Secure Multi-Party Computation. Working draft (October 2002)
-
(2002)
Working Draft
-
-
Goldreich, O.1
-
13
-
-
0030149547
-
Software Protection and Simulation on Oblivious RAMs
-
Goldreich, O., Ostrovsky, R.: Software Protection and Simulation on Oblivious RAMs. J. ACM 43(3), 431-473 (1996)
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
15
-
-
0036361105
-
Executing SQL over Encrypted Data in the Database-Service-Provider Model
-
ACM
-
Hacigümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in the Database-Service-Provider Model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, pp. 216-227. ACM (2002)
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
17
-
-
80955157888
-
Can Homomorphic Encryption be Practical?
-
Lauter, K., Naehrig, M., Vaikuntanathan, V.: Can Homomorphic Encryption be Practical? In: Proceedings of the 3rd ACMWorkshop on Cloud Computing Security Workshop, CCSW 2011, pp. 113-124 (2011)
-
(2011)
Proceedings of the 3rd ACMWorkshop on Cloud Computing Security Workshop, CCSW 2011
, pp. 113-124
-
-
Lauter, K.1
Naehrig, M.2
Vaikuntanathan, V.3
-
18
-
-
79951793525
-
Better Key Sizes (and Attacks) for LWE-Based Encryption
-
Kiayias, A. (ed.) CT-RSA 2011. Springer, Heidelberg
-
Lindner, R., Peikert, C.: Better Key Sizes (and Attacks) for LWE-Based Encryption. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 319-339. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6558
, pp. 319-339
-
-
Lindner, R.1
Peikert, C.2
-
20
-
-
50249148926
-
SWIFFT: A Modest Proposal for FFT Hashing
-
Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
-
Lyubashevsky, V., Micciancio, D., Peikert, C., Rosen, A.: SWIFFT: A Modest Proposal for FFT Hashing. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 54-72. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 54-72
-
-
Lyubashevsky, V.1
Micciancio, D.2
Peikert, C.3
Rosen, A.4
-
22
-
-
84857066233
-
Revisiting the Computational Practicality of Private Information Retrieval
-
Danezis, G. (ed.) FC 2011. Springer, Heidelberg
-
Olumofin, F., Goldberg, I.: Revisiting the Computational Practicality of Private Information Retrieval. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 158-172. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7035
, pp. 158-172
-
-
Olumofin, F.1
Goldberg, I.2
-
25
-
-
38049002436
-
A Survey of Single-Database Private Information Retrieval: Techniques and Applications
-
Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
-
Ostrovsky, R., Skeith III, W.E.: A Survey of Single-Database Private Information Retrieval: Techniques and Applications. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 393-411. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4450
, pp. 393-411
-
-
Ostrovsky, R.1
Skeith III, W.E.2
-
26
-
-
84855705865
-
Private Search in the Real World
-
Zakon, R.H., McDermott, J.P., Locasto, M.E. (eds.) ACM
-
Pappas, V., Raykova, M., Vo, B., Bellovin, S.M., Malkin, T.: Private Search in the Real World. In: Zakon, R.H., McDermott, J.P., Locasto, M.E. (eds.) Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, pp. 83-92. ACM (2011)
-
(2011)
Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011
, pp. 83-92
-
-
Pappas, V.1
Raykova, M.2
Vo, B.3
Bellovin, S.M.4
Malkin, T.5
-
27
-
-
70350649061
-
Predicate Privacy in Encryption Systems
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Shen, E., Shi, E., Waters, B.: Predicate Privacy in Encryption Systems. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 457-473. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
28
-
-
0033705124
-
Practical Techniques for Searches on Encrypted Data
-
IEEE Computer Society
-
Song, D.X.,Wagner, D., Perrig, A.: Practical Techniques for Searches on Encrypted Data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 44-55. IEEE Computer Society (2000)
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
|