메뉴 건너뛰기




Volumn , Issue , 2014, Pages 330-337

Distributed searchable symmetric encryption

Author keywords

Practical Efficiency; Search Pattern Hiding; Searchable Encryption; Semi Honest Model

Indexed keywords

DIGITAL STORAGE; EFFICIENCY;

EID: 84910093538     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PST.2014.6890956     Document Type: Conference Paper
Times cited : (30)

References (29)
  • 2
    • 4043168634 scopus 로고    scopus 로고
    • The ibm PCIXCC: A new cryptographic coprocessor for the ibm eserver
    • Todd W. Arnold and Leendert van Doorn. The IBM PCIXCC: A New Cryptographic Coprocessor for the IBM eServer. IBM Journal of Research and Development, 48(3-4):475-488, 2004.
    • (2004) IBM Journal of Research and Development , vol.48 , Issue.3-4 , pp. 475-488
    • Arnold, T.W.1    Van Doorn, L.2
  • 6
    • 84879846974 scopus 로고    scopus 로고
    • Private database queries using somewhat homomorphic encryption
    • Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, and David J. Wu. Private Database Queries Using Somewhat Homomorphic Encryption. In ACNS, pages 102-118, 2013.
    • (2013) ACNS , pp. 102-118
    • Boneh, D.1    Gentry, C.2    Halevi, S.3    Wang, F.4    Wu, D.J.5
  • 7
    • 84867033179 scopus 로고    scopus 로고
    • Selective document retrieval from encrypted database
    • Christoph Bosch, Qiang Tang, Pieter H. Hartel, and Willem Jonker. Selective Document Retrieval from Encrypted Database. In ISC, pages 224-241, 2012.
    • (2012) ISC , pp. 224-241
    • Bosch, C.1    Tang, Q.2    Hartel, P.H.3    Jonker, W.4
  • 8
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Yan-Cheng Chang and Michael Mitzenmacher. Privacy Preserving Keyword Searches on Remote Encrypted Data. In ACNS, pages 442-455, 2005.
    • (2005) ACNS , pp. 442-455
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 10
    • 85037333435 scopus 로고    scopus 로고
    • Efficient techniques for privacy-preserving sharing of sensitive information
    • Emiliano De Cristofaro, Yanbin Lu, and Gene Tsudik. Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information. In TRUST, pages 239-253, 2011.
    • (2011) TRUST , pp. 239-253
    • De Cristofaro, E.1    Lu, Y.2    Tsudik, G.3
  • 11
    • 81255134906 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • Reza Curtmola, Juan A. Garay, Seny Kamara, and Rafail Ostrovsky. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. Journal of Computer Security, 19(5):895-934, 2011.
    • (2011) Journal of Computer Security , vol.19 , Issue.5 , pp. 895-934
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 12
    • 33244488406 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2003/216
    • Eu-Jin Goh. Secure Indexes. Cryptology ePrint Archive, Report 2003/216, 2003.
    • (2003) Secure Indexes
    • Goh, E.-J.1
  • 14
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • Oded Goldreich and Rafail Ostrovsky. Software Protection and Simulation on Oblivious RAMs. J. ACM, 43(3):431-473, 1996.
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 15
    • 84883285558 scopus 로고    scopus 로고
    • Parallel and dynamic searchable symmetric encryption
    • Seny Kamara and Charalampos Papamanthou. Parallel and Dynamic Searchable Symmetric Encryption. In Financial Cryptography, pages 258-274, 2013.
    • (2013) Financial Cryptography , pp. 258-274
    • Kamara, S.1    Papamanthou, C.2
  • 17
    • 26444442384 scopus 로고    scopus 로고
    • Security issues in querying encrypted data
    • Murat Kantarcioglu and Chris Clifton. Security Issues in Querying Encrypted Data. In DBSec, pages 325-337, 2005.
    • (2005) DBSec , pp. 325-337
    • Kantarcioglu, M.1    Clifton, C.2
  • 18
    • 84865817216 scopus 로고    scopus 로고
    • UC-secure searchable symmetric encryption
    • Kaoru Kurosawa and Yasuhiro Ohtaki. UC-Secure Searchable Symmetric Encryption. In Financial Cryptography, pages 285-298, 2012.
    • (2012) Financial Cryptography , pp. 285-298
    • Kurosawa, K.1    Ohtaki, Y.2
  • 20
    • 84893808472 scopus 로고    scopus 로고
    • Search pattern leakage in searchable encryption: Attacks and new construction
    • Chang Liu, Liehuang Zhu, Mingzhong Wang, and Yu an Tan. Search Pattern Leakage in Searchable Encryption: Attacks and New Construction. Inf. Sci., 265:176-188, 2014.
    • (2014) Inf. Sci , vol.265 , pp. 176-188
    • Liu, C.1    Zhu, L.2    Wang, M.3    An Tan, Y.4
  • 21
    • 0025154732 scopus 로고
    • Efficient computation on oblivious RAMs
    • Rafail Ostrovsky. Efficient Computation on Oblivious RAMs. In STOC, pages 514-523, 1990.
    • (1990) STOC , pp. 514-523
    • Ostrovsky, R.1
  • 24
    • 74049149270 scopus 로고    scopus 로고
    • Secure anonymous database search
    • Mariana Raykova, Binh Vo, Steven M. Bellovin, and Tal Malkin. Secure Anonymous Database Search. In CCSW, pages 115-126, 2009.
    • (2009) CCSW , pp. 115-126
    • Raykova, M.1    Vo, B.2    Bellovin, S.M.3    Malkin, T.4
  • 25
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • Emily Shen, Elaine Shi, and Brent Waters. Predicate Privacy in Encryption Systems. In TCC, pages 457-473, 2009.
    • (2009) TCC , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 28
    • 70350676849 scopus 로고    scopus 로고
    • An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data
    • Peishun Wang, Huaxiong Wang, and Josef Pieprzyk. An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. In WISA, pages 145-159, 2008.
    • (2008) WISA , pp. 145-159
    • Wang, P.1    Wang, H.2    Pieprzyk, J.3
  • 29
    • 58449092891 scopus 로고    scopus 로고
    • Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups
    • Peishun Wang, Huaxiong Wang, and Josef Pieprzyk. Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. In CANS, pages 178-195, 2008.
    • (2008) CANS , pp. 178-195
    • Wang, P.1    Wang, H.2    Pieprzyk, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.