-
1
-
-
79959972183
-
Trusteddb: A trusted hardware based database with privacy and data confidentiality
-
Bajaj, S., Sion, R.: Trusteddb: a trusted hardware based database with privacy and data confidentiality. In: ACM SIGMOD, pp. 205-216 (2011)
-
(2011)
ACM SIGMOD
, pp. 205-216
-
-
Bajaj, S.1
Sion, R.2
-
2
-
-
3142716056
-
Order preserving encryption for numeric data
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: ACM SIGMOD, pp. 563-574 (2004)
-
(2004)
ACM SIGMOD
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
33746748166
-
Aggregation queries in the database-as-A-service model
-
In: Damiani, E., Liu, P. (eds.) Springer, Heidelberg
-
Mykletun, E., Tsudik, G.: Aggregation queries in the database-as-a- service model. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol. 4127, pp. 89-103. Springer, Heidelberg (2006)
-
(2006)
Data and Applications Security 2006. LNCS
, vol.4127
, pp. 89-103
-
-
Mykletun, E.1
Tsudik, G.2
-
4
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
IEEE Computer Society
-
Shi, E., Bethencourt, J., Chan, T.H.H., Song, D., Perrig, A.: Multi-dimensional range query over encrypted data. In: IEEE Security & Privacy, pp. 350-364. IEEE Computer Society (2007)
-
(2007)
IEEE Security & Privacy
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.H.H.3
Song, D.4
Perrig, A.5
-
5
-
-
84991010622
-
Anti-tamper databases: Processing aggregate queries over encrypted databases
-
Chung, S., Ozsoyoglu, S., Anti-tamper, G.: Anti-tamper databases: Processing aggregate queries over encrypted databases. In: ICDE Workshops, p. 98 (2006)
-
(2006)
ICDE Workshops
, pp. 98
-
-
Chung, S.1
Ozsoyoglu, S.2
Anti-Tamper, G.3
-
6
-
-
67650690965
-
Order-preserving symmetric encryption
-
In: Joux, A. (ed.) Springer, Heidelberg
-
Boldyreva, A., Chenette, N., Lee, Y., O'Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224-241. Springer, Heidelberg (2009)
-
(2009)
Eurocrypt 2009. LNCS
, vol.5479
, pp. 224-241
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
O'neill, A.4
-
7
-
-
84861186664
-
Secure multidimensional range queries over outsourced data
-
Hore, B.,Mehrotra, S., Canim,M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. The VLDB Journal 21(3), 333-358 (2012)
-
(2012)
The VLDB Journal
, vol.21
, Issue.3
, pp. 333-358
-
-
Hore, B.1
Mehrotra, S.2
Canim, M.3
Kantarcioglu, M.4
-
8
-
-
84897723581
-
Efficient privacy-preserving range queries over encrypted data in cloud computing
-
Samanthula, B.K., Jiang, W.: Efficient privacy-preserving range queries over encrypted data in cloud computing. In: IEEE CLOUD, pp. 51-58 (2013)
-
(2013)
IEEE CLOUD
, pp. 51-58
-
-
Samanthula, B.K.1
Jiang, W.2
-
9
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
ACM
-
Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: CCS, pp. 139-148. ACM (2008)
-
(2008)
CCS
, pp. 139-148
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
10
-
-
84872068962
-
Managing and accessing data in the cloud: Privacy risks and approaches
-
De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Managing and accessing data in the cloud: Privacy risks and approaches. In: 7th International Conference on Risk and Security of Internet and Systems, pp. 1-9 (2012)
-
(2012)
7th International Conference on Risk and Security of Internet and Systems
, pp. 1-9
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Samarati, P.3
-
11
-
-
85179556059
-
Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
-
Islam, M., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In: NDSS (2012)
-
(2012)
NDSS
-
-
Islam, M.1
Kuzu, M.2
Kantarcioglu, M.3
-
12
-
-
26444553177
-
Encryption schemes
-
Cambridge University Press, Cambridge
-
Goldreich, O.: Encryption Schemes. In: The Foundations of Cryptography, vol. 2, pp. 373-470. Cambridge University Press, Cambridge (2004)
-
(2004)
The Foundations of Cryptography
, vol.2
, pp. 373-470
-
-
Goldreich, O.1
-
13
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
In: Stern, J. (ed.) Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)
-
(1999)
Eurocrypt 1999. LNCS
, vol.1592
, pp. 223
-
-
Paillier, P.1
-
14
-
-
85015233361
-
-
Technical Report TR 2014-05, Dept. of Computer Science, Missouri S&T, Rolla
-
Samanthula, B.K., Jiang, W., Bertino, E.: Privacy-preserving complex query evaluation over semantically secure encrypted data. Technical Report TR 2014-05, Dept. of Computer Science, Missouri S&T, Rolla (2014), http://web.mst.edu/wjiang/PPQED.pdf
-
(2014)
Privacy-preserving Complex Query Evaluation over Semantically Secure Encrypted Data
-
-
Samanthula, B.K.1
Jiang, W.2
Bertino, E.3
-
15
-
-
33645593031
-
General cryptographic protocols
-
Cambridge University Press, Cambridge
-
Goldreich, O.: General Cryptographic Protocols. In: The Foundations of Cryptography, vol. 2, pp. 599-746. Cambridge University Press, Cambridge (2004)
-
(2004)
The Foundations of Cryptography
, vol.2
, pp. 599-746
-
-
Goldreich, O.1
-
16
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
In: Vadhan, S.P. (ed.) Springer, Heidelberg
-
Boneh, D.,Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535-554. Springer, Heidelberg (2007)
-
(2007)
TCC 2007. LNCS
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
17
-
-
33745623486
-
Efficient execution of aggregation queries over encrypted relational databases
-
In: Lee, Y., Li, J.,Whang, K.-Y., Lee, D. (eds.) Springer, Heidelberg
-
Hac?gumus, H., Iyer, B., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Lee, Y., Li, J.,Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol. 2973, pp. 125-136. Springer, Heidelberg (2004)
-
(2004)
DASFAA 2004. LNCS
, vol.2973
, pp. 125-136
-
-
Hacgumus, H.1
Iyer, B.2
Mehrotra, S.3
-
18
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
In: Jakobsson, M., Yung, M., Zhou, J. (eds.) Springer, Heidelberg
-
Golle, P., Staddon, J.,Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31-45. Springer, Heidelberg (2004)
-
(2004)
ACNS 2004. LNCS
, vol.3089
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
19
-
-
82655162816
-
Cryptdb: Protecting confidentiality with encrypted query processing
-
ACM
-
Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: Cryptdb: Protecting confidentiality with encrypted query processing. In: SOSP, pp. 85-100. ACM (2011)
-
(2011)
SOSP
, pp. 85-100
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
Balakrishnan, H.4
-
20
-
-
82955173838
-
Oblivious RAM with o((logn)3) worst-case cost
-
In: Lee, D.H.,Wang, X. (eds.) Springer, Heidelberg
-
Shi, E., Chan, T.-H.H., Stefanov, E., Li,M.: Oblivious RAM with o((logn)3) worst-case cost. In: Lee, D.H.,Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 197-214. Springer, Heidelberg (2011)
-
(2011)
ASIACRYPT 2011. LNCS
, vol.7073
, pp. 197-214
-
-
Shi, E.1
Chan, T.-H.H.2
Stefanov, E.3
Li, M.4
-
21
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
ACM
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169-178. ACM (2009)
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
22
-
-
80955157888
-
Can homomorphic encryption be practical?
-
ACM
-
Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: The ACM Workshop on Cloud Computing Security, pp. 113-124. ACM (2011)
-
(2011)
The ACM Workshop on Cloud Computing Security
, pp. 113-124
-
-
Naehrig, M.1
Lauter, K.2
Vaikuntanathan, V.3
-
23
-
-
79957974657
-
Implementing gentry's fully-homomorphic encryption scheme
-
In: Paterson, K.G. (ed.) Springer, Heidelberg
-
Gentry, C., Halevi, S.: Implementing gentry's fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129-148. Springer, Heidelberg (2011)
-
(2011)
Eurocrypt 2011. LNCS
, vol.6632
, pp. 129-148
-
-
Gentry, C.1
Halevi, S.2
-
24
-
-
0020312165
-
Protocols for secure computations
-
IEEE Computer Society
-
Yao, A.C.: Protocols for secure computations. In: SFCS, pp. 160-164. IEEE Computer Society (1982)
-
(1982)
SFCS
, pp. 160-164
-
-
Yao, A.C.1
-
25
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE Computer Society
-
Yao, A.C.: How to generate and exchange secrets. In: SFCS, pp. 162-167. IEEE Computer Society (1986)
-
(1986)
SFCS
, pp. 162-167
-
-
Yao, A.C.1
-
26
-
-
0023545076
-
How to play any mental game-A completeness theorem for protocols with honest majority
-
ACM
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game-a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM (1987)
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
27
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
ACM
-
Chaum, D., Crepeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: STOC, pp. 11-19. ACM (1988)
-
(1988)
STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
28
-
-
70449575839
-
Homomorphic encryption and secure comparison
-
Damgard, I., Geisler, M., Kroigard, M.: Homomorphic encryption and secure comparison. International Journal of Applied Cryptography 1(1), 22-31 (2008)
-
(2008)
International Journal of Applied Cryptography
, vol.1
, Issue.1
, pp. 22-31
-
-
Damgard, I.1
Geisler, M.2
Kroigard, M.3
-
29
-
-
84871578175
-
Twin clouds: An architecture for secure cloud computing (extended abstract)
-
March
-
Bugiel, S., Nurnberger, S., Sadeghi, A.R., Schneider, T.: Twin clouds: An architecture for secure cloud computing (extended abstract). In: Workshop on Cryptography and Security in Clouds (March 2011)
-
(2011)
Workshop on Cryptography and Security in Clouds
-
-
Bugiel, S.1
Nurnberger, S.2
Sadeghi, A.R.3
Schneider, T.4
-
30
-
-
84878119000
-
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing
-
Wang, J., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S., Chen, X.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Computer Science and Information Systems 10(2), 667-684 (2013)
-
(2013)
Computer Science and Information Systems
, vol.10
, Issue.2
, pp. 667-684
-
-
Wang, J.1
Ma, H.2
Tang, Q.3
Li, J.4
Zhu, H.5
Ma, S.6
Chen, X.7
-
32
-
-
33746092442
-
Efficient binary conversion for paillier encrypted values
-
In: Vaudenay, S. (ed.) Springer, Heidelberg
-
Schoenmakers, B., Tuyls, P.: Efficient binary conversion for paillier encrypted values. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 522-537. Springer, Heidelberg (2006)
-
(2006)
Eurocrypt 2006. LNCS
, vol.4004
, pp. 522-537
-
-
Schoenmakers, B.1
Tuyls, P.2
-
33
-
-
84877991754
-
An efficient and probabilistic secure bit-decomposition
-
Samanthula, B.K., Jiang, W.: An efficient and probabilistic secure bit-decomposition. In: ACM ASIACCS, pp. 541-546 (2013)
-
(2013)
ACM ASIACCS
, pp. 541-546
-
-
Samanthula, B.K.1
Jiang, W.2
-
34
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: Proceedings of the 20th USENIX Conference on Security, pp. 35-35 (2011)
-
(2011)
Proceedings of the 20th USENIX Conference on Security
, pp. 35-35
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
35
-
-
71549170830
-
Improved garbled circuit building blocks and applications to auctions and computing minima
-
In: Garay, J.A.,Miyaji, A., Otsuka, A. (eds.) Springer, Heidelberg
-
Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved garbled circuit building blocks and applications to auctions and computing minima. In: Garay, J.A.,Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1-20. Springer, Heidelberg (2009)
-
(2009)
CANS 2009. LNCS
, vol.5888
, pp. 1-20
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
|