-
2
-
-
79952511284
-
Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation
-
N. Attrapadung and B. Libert. Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation. In Proc. of PKC, pages 384-402, 2010.
-
(2010)
Proc. of PKC
, pp. 384-402
-
-
Attrapadung, N.1
Libert, B.2
-
3
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In Proc. of EUROCRYPT, pages 506-522, 2004.
-
(2004)
Proc. of EUROCRYPT
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
4
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In Proc. of TCC, pages 535-554, 2007.
-
(2007)
Proc. of TCC
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
5
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multi-keyword ranked search over encrypted cloud data. In Proc. of IEEE INFOCOM, pages 829-837, 2011.
-
(2011)
Proc. of IEEE INFOCOM
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
6
-
-
44049096900
-
Privacy preserving keyword searches on remote encrypted data
-
Y.-C. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. In Proc. of ACNS, pages 391-421, 2005.
-
(2005)
Proc. of ACNS
, pp. 391-421
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
7
-
-
0032201622
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Private information retrieval. Journal of the ACM, 45(6):965-981, 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
9
-
-
0018480749
-
Ubiquitous b-tree
-
D. Comer. Ubiquitous b-tree. ACM computing surveys, 11(2):121-137, 1979.
-
(1979)
ACM Computing Surveys
, vol.11
, Issue.2
, pp. 121-137
-
-
Comer, D.1
-
10
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: improved definitions and efficient constructions. In Proc. of ACM CCS, pages 79-88, 2006.
-
(2006)
Proc. of ACM CCS
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
12
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, and B. R. Waters. Secure conjunctive keyword search over encrypted data. In Proc. of ACNS, pages 31-45, 2004.
-
(2004)
Proc. of ACNS
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.R.3
-
13
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Y. Hwang and P. Lee. Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Pairing, pages 2-22, 2007.
-
(2007)
Pairing
, pp. 2-22
-
-
Hwang, Y.1
Lee, P.2
-
15
-
-
84872006849
-
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
-
M. Li, S. Yu, K. Ren, and W. Lou. Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In Proc. of SecureComm, pages 89-106, 2010.
-
(2010)
Proc. of SecureComm
, pp. 89-106
-
-
Li, M.1
Yu, S.2
Ren, K.3
Lou, W.4
-
16
-
-
78649836731
-
Computationally efficient searchable symmetric encryption
-
P. Liesdonk, S. Sedghi, J. Doumen, P. Hartel, and W. Jonker. Computationally efficient searchable symmetric encryption. Secure Data Management, pages 87-100, 2010.
-
(2010)
Secure Data Management
, pp. 87-100
-
-
Liesdonk, P.1
Sedghi, S.2
Doumen, J.3
Hartel, P.4
Jonker, W.5
-
17
-
-
84877956701
-
Privacy-preserving logarithmic-time search on encrypted data in cloud
-
Y. Lu. Privacy-preserving logarithmic-time search on encrypted data in cloud. In Proc. of NDSS, 2012.
-
Proc. of NDSS, 2012
-
-
Lu, Y.1
-
19
-
-
54249111543
-
Extending fagin's algorithm for more users based on multidimensional b-tree
-
M. Ondreička and J. Pokorný. Extending fagin's algorithm for more users based on multidimensional b-tree. In Proc. of ADBIS, pages 199-214, 2008.
-
(2008)
Proc. of ADBIS
, pp. 199-214
-
-
Ondreička, M.1
Pokorný, J.2
-
20
-
-
76849085704
-
Privacy-preserving similarity-based text retrieval
-
H. Pang, J. Shen, and R. Krishnan. Privacy-preserving similarity-based text retrieval. ACM Transactions on Internet Technology, 10(1):4, 2010.
-
(2010)
ACM Transactions on Internet Technology
, vol.10
, Issue.1
, pp. 4
-
-
Pang, H.1
Shen, J.2
Krishnan, R.3
-
22
-
-
0020277962
-
Multidimensional b-trees for associative searching in database systems
-
P. Scheuermann and M. Ouksel. Multidimensional b-trees for associative searching in database systems. Information systems, 7(2):123-137, 1982.
-
(1982)
Information Systems
, vol.7
, Issue.2
, pp. 123-137
-
-
Scheuermann, P.1
Ouksel, M.2
-
23
-
-
70350649061
-
Predicate privacy in encryption systems
-
E. Shen, E. Shi, and B. Waters. Predicate privacy in encryption systems. In Proc. of TCC, pages 457-473, 2009.
-
(2009)
Proc. of TCC
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
25
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
E. Shi, J. Bethencourt, H. Chan, D. Song, and A. Perrig. Multi-dimensional range query over encrypted data. In Proc. of S&P, pages 350-364, 2007.
-
(2007)
Proc. of S&P
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, H.3
Song, D.4
Perrig, A.5
-
27
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In Proc. of S&P, pages 44-55, 2000.
-
(2000)
Proc. of S&P
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
28
-
-
70349220256
-
Confidentiality-preserving rank-ordered search
-
A. Swaminathan, Y. Mao, G.-M. Su, H. Gou, A. L. Varna, S. He, M. Wu, and D. W. Oard. Confidentiality-preserving rank-ordered search. In Proc. of the 2007 ACM Workshop on Storage Security and Survivability, pages 7-12, 2007.
-
(2007)
Proc. of the 2007 ACM Workshop on Storage Security and Survivability
, pp. 7-12
-
-
Swaminathan, A.1
Mao, Y.2
Su, G.-M.3
Gou, H.4
Varna, A.L.5
He, S.6
Wu, M.7
Oard, D.W.8
-
29
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
C. Wang, N. Cao, K. Ren, and W. Lou. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems, 23(8):1467-1479, 2012.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
31
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W. K.Wong, D.W. Cheung, B. Kao, and N. Mamoulis. Secure knn computation on encrypted databases. In Proc. of SIGMOD, pages 139-152, 2009.
-
(2009)
Proc. of SIGMOD
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
32
-
-
84881354487
-
Secure nearest neighbor revisited
-
to appear in
-
B. Yao, F. Li, and X. Xiao. Secure nearest neighbor revisited. http://www.cs.utah.edu/∼lifeifei/papers/snnicde.pdf, to appear in ICDE, 2013.
-
(2013)
ICDE
-
-
Yao, B.1
Li, F.2
Xiao, X.3
-
33
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proc. of IEEE INFOCOM, pages 1-9, 2010.
-
(2010)
Proc. of IEEE INFOCOM
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
34
-
-
70349110963
-
Zerber+r: Top-k retrieval from a confidential index
-
S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski. Zerber+r: Top-k retrieval from a confidential index. In Proc. of EDBT, pages 439-449, 2009.
-
(2009)
Proc. of EDBT
, pp. 439-449
-
-
Zerr, S.1
Olmedilla, D.2
Nejdl, W.3
Siberski, W.4
|