메뉴 건너뛰기




Volumn 62, Issue , 2016, Pages 76-84

Memory leakage-resilient searchable symmetric encryption

Author keywords

Cloud computing; Memory leakage resilient; Physical unclonable functions (PUFs); Searchable symmetric encryption; Side channel attacks

Indexed keywords

ACCESS CONTROL; CLOUD COMPUTING; CRYPTOGRAPHY; DATA PRIVACY; HARDWARE SECURITY;

EID: 84950146701     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2015.11.003     Document Type: Article
Times cited : (16)

References (28)
  • 1
    • 84929910782 scopus 로고    scopus 로고
    • Privacy-preserving keyword search over encrypted data in cloud computing
    • S. Jajodia K. Kant P. Samarati A. Singhal V. Swarup C. Wang Springer New York
    • [1] Sun, W., Lou, W., Hou, Y.T., Li, H., Privacy-preserving keyword search over encrypted data in cloud computing. Jajodia, S., Kant, K., Samarati, P., Singhal, A., Swarup, V., Wang, C., (eds.) Secure Cloud Computing 2014, 2014, Springer, New York, 189–212.
    • (2014) Secure Cloud Computing 2014 , pp. 189-212
    • Sun, W.1    Lou, W.2    Hou, Y.T.3    Li, H.4
  • 2
  • 3
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • C. Cachin J.L. Camenisch Springer Heidelberg
    • [3] Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G., Public key encryption with keyword search. Cachin, C., Camenisch, J.L., (eds.) EUROCRYPT 2004 LNCS, vol. 3027, 2004, Springer, Heidelberg, 506–522.
    • (2004) EUROCRYPT 2004, LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 4
    • 84983216850 scopus 로고    scopus 로고
    • Secure indexes. Cryptology ePrint Archive, Report 2003/216
    • [4] E.-J. Goh, Secure indexes. Cryptology ePrint Archive, Report 2003/216, 2003. http://eprint.iacr.org/.
    • (2003)
    • Goh, E.-J.1
  • 5
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • [5] Bloom, B.H., Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13:7 (1970), 422–426.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 6
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • J. Ioannidis A. Keromytis M. Yung Springer Heidelberg
    • [6] Chang, Y.C., Mitzenmacher, M., Privacy preserving keyword searches on remote encrypted data. Ioannidis, J., Keromytis, A., Yung, M., (eds.) ACNS 2005 LNCS, vol. 3531, 2005, Springer, Heidelberg, 442–455.
    • (2005) ACNS 2005, LNCS , vol.3531 , pp. 442-455
    • Chang, Y.C.1    Mitzenmacher, M.2
  • 7
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: improved definitions and efficient constructions
    • ACM
    • [7] Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R., Searchable symmetric encryption: improved definitions and efficient constructions. ACM CCS 2006, 2006, ACM, 79–88.
    • (2006) ACM CCS 2006 , pp. 79-88
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 9
    • 84869394463 scopus 로고    scopus 로고
    • Dynamic searchable symmetric encryption
    • ACM
    • [9] Kamara, S., Papamanthou, C., Roeder, T., Dynamic searchable symmetric encryption. ACM CCS 2012, 2012, ACM, 965–976.
    • (2012) ACM CCS 2012 , pp. 965-976
    • Kamara, S.1    Papamanthou, C.2    Roeder, T.3
  • 10
    • 85173019558 scopus 로고    scopus 로고
    • Practical dynamic searchable encryption with small leakage
    • [10] Stefanov, E., Papamanthou, C., Shi, E., Practical dynamic searchable encryption with small leakage. NDSS’14, 2014.
    • (2014) NDSS’14
    • Stefanov, E.1    Papamanthou, C.2    Shi, E.3
  • 11
    • 78650834524 scopus 로고    scopus 로고
    • Structured encryption and controlled disclosure
    • M. Abe Springer Heidelberg
    • [11] Chase, M., Kamara, S., Structured encryption and controlled disclosure. Abe, M., (eds.) ASIACRYPT 2010 LNCS, vol. 6477, 2010, Springer, Heidelberg, 577–594.
    • (2010) ASIACRYPT 2010, LNCS , vol.6477 , pp. 577-594
    • Chase, M.1    Kamara, S.2
  • 13
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • M. Jakobsson M. Yung J. Zhou Springer Heidelberg
    • [13] Golle, P., Staddon, J., Waters, B.R., Secure conjunctive keyword search over encrypted data. Jakobsson, M., Yung, M., Zhou, J., (eds.) ACNS 2004 LNCS, vol. 3089, 2004, Springer, Heidelberg, 31–45.
    • (2004) ACNS 2004, LNCS , vol.3089 , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.R.3
  • 14
    • 84884472579 scopus 로고    scopus 로고
    • Highly-scalable searchable symmetric encryption with support for boolean queries
    • R. Canetti J.A. Garay Springer Heidelberg
    • [14] Cash, D., Jarecki, S., Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M., Steiner, M., Highly-scalable searchable symmetric encryption with support for boolean queries. Canetti, R., Garay, J.A., (eds.) CRYPTO 2013 LNCS, vol. 8042, 2013, Springer, Heidelberg, 353–373.
    • (2013) CRYPTO 2013, LNCS , vol.8042 , pp. 353-373
    • Cash, D.1    Jarecki, S.2    Jaeger, J.3    Jarecki, S.4    Jutla, C.5    Krawczyk, H.6    Roşu, M.7    Steiner, M.8
  • 15
    • 77953308681 scopus 로고    scopus 로고
    • Fuzzy keyword search over encrypted data in cloud computing
    • IEEE
    • [15] Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W., Fuzzy keyword search over encrypted data in cloud computing. INFOCOM 2010, 2010, IEEE, 1–5.
    • (2010) INFOCOM 2010 , pp. 1-5
    • Li, J.1    Wang, Q.2    Wang, C.3    Cao, N.4    Ren, K.5    Lou, W.6
  • 17
    • 84905923774 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • [17] Cao, N., Wang, C., Li, M., Ren, K., Lou, W., Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25:1 (2014), 222–233.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.1 , pp. 222-233
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 18
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • B.S. Kaliski Springer Heidelberg
    • [18] Biham, E., Shamir, A., Differential fault analysis of secret key cryptosystems. Kaliski, B.S., (eds.) CRYPTO 1997 LNCS, vol. 1294, 1997, Springer, Heidelberg, 513–525.
    • (1997) CRYPTO 1997, LNCS , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 20
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems
    • N. Koblitz Springer Heidelberg
    • [20] Koccher, P.C., Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. Koblitz, N., (eds.) CRYPTO 1996 LNCS, vol. 1109, 1996, Springer, Heidelberg, 104–113.
    • (1996) CRYPTO 1996, LNCS , vol.1109 , pp. 104-113
    • Koccher, P.C.1
  • 21
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • M. Wiener Springer Heidelberg
    • [21] Kocher, P.C., Jaffe, J., Jun, B., Differential power analysis. Wiener, M., (eds.) CRYPTO 1999 LNCS, vol. 1666, 1999, Springer, Heidelberg, 388–397.
    • (1999) CRYPTO 1999, LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 22
    • 78650238574 scopus 로고    scopus 로고
    • Electromagnetic analysis (ema): Measures and counter-measures for smart cards
    • in: E-smart 2001
    • [22] J.-J. Quisquater, D. Samyde, Electromagnetic analysis (ema): Measures and counter-measures for smart cards, in: E-smart 2001, 2001, pp. 200–210.
    • (2001) , pp. 200-210
    • Quisquater, J.-J.1    Samyde, D.2
  • 24
    • 80051955337 scopus 로고    scopus 로고
    • Physically uncloneable functions in the universal composition framework
    • P. Rogaway Springer Heidelberg
    • [24] Brzuska, C., Fischlin, M., Schröder, H., Katzenbeisser, S., Physically uncloneable functions in the universal composition framework. Rogaway, P., (eds.) CRYPTO 2011 LNCS, vol. 6841, 2011, Springer, Heidelberg, 51–70.
    • (2011) CRYPTO 2011, LNCS , vol.6841 , pp. 51-70
    • Brzuska, C.1    Fischlin, M.2    Schröder, H.3    Katzenbeisser, S.4
  • 25
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • O. Reingold Springer Heidelberg
    • [25] Akavia, A., Goldwasser, S., Vaikuntanathan, V., Simultaneous hardcore bits and cryptography against memory attacks. Reingold, O., (eds.) TCC 2009 LNCS, vol. 5444, 2009, Springer, Heidelberg, 474–495.
    • (2009) TCC 2009, LNCS , vol.5444 , pp. 474-495
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 26
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • [26] Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38:1 (2008), 97–139.
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 27
    • 72449124251 scopus 로고    scopus 로고
    • Memory leakage-resilient encryption based on physically unclonable functions
    • M. Matsui Springer Heidelberg
    • [27] Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B., Tuyls, P., Memory leakage-resilient encryption based on physically unclonable functions. Matsui, M., (eds.) ASIACRYPT 2009 LNCS, vol. 5912, 2009, Springer, Heidelberg, 685–702.
    • (2009) ASIACRYPT 2009, LNCS , vol.5912 , pp. 685-702
    • Armknecht, F.1    Maes, R.2    Sadeghi, A.-R.3    Sunar, B.4    Tuyls, P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.