-
2
-
-
84881232126
-
-
SP 2013
-
Bellare, M., Hoang, V.T., Keelveedhi, S., Rogaway, P.: Efficient garbling from a fixed-key blockcipher. SP 2013, 478–492 (2013)
-
(2013)
Efficient Garbling from a Fixed-Key Blockcipher
, pp. 478-492
-
-
Bellare, M.1
Hoang, V.T.2
Keelveedhi, S.3
Rogaway, P.4
-
3
-
-
84869382999
-
-
CCS 2012
-
Bellare, M., Hoang, V.T., Rogaway, P.: Foundations of garbled circuits. CCS 2012, 784–796 (2012)
-
(2012)
Foundations of Garbled Circuits
, pp. 784-796
-
-
Bellare, M.1
Hoang, V.T.2
Rogaway, P.3
-
4
-
-
84871578175
-
Twin clouds: An architecture for secure cloud computing
-
Bugiel, S., Nurnberger, S., Sadeghi, A., Schneider, T.: Twin clouds: an architecture for secure cloud computing. In: Workshop on Cryptography and Security in Clouds (WCSC 2011) (2011)
-
(2011)
Workshop on Cryptography and Security in Clouds (WCSC 2011)
-
-
Bugiel, S.1
Nurnberger, S.2
Sadeghi, A.3
Schneider, T.4
-
5
-
-
85042713075
-
Secure outsourced garbled circuit evaluation for mobile devices
-
Carter, H., Mood, B., Traynor, P., Butler, K.R.: Secure outsourced garbled circuit evaluation for mobile devices. In: USENIX Security, pp. 289–304 (2013)
-
(2013)
USENIX Security
, pp. 289-304
-
-
Carter, H.1
Mood, B.2
Traynor, P.3
Butler, K.R.4
-
6
-
-
0032201622
-
Private information retrieval
-
Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965–981 (1998). http://doi.acm.org/10.1145/293347.293350
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
8
-
-
84945300542
-
A provably secure additive and multiplicative privacy homomorphism
-
Chan, A.H., Gligor, V.D. (eds.), Springer, Heidelberg
-
Domingo-Ferrer, J.: A provably secure additive and multiplicative privacy homomorphism. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 471–483. Springer, Heidelberg (2002)
-
(2002)
ISC 2002. LNCS
, vol.2433
, pp. 471-483
-
-
Domingo-Ferrer, J.1
-
9
-
-
84901750940
-
-
ICDE 2014
-
Elmehdwi, Y., Samanthula, B., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. ICDE 2014, 664–675 (2014)
-
(2014)
Secure K-Nearest Neighbor Query over Encrypted Data in Outsourced Environments
, pp. 664-675
-
-
Elmehdwi, Y.1
Samanthula, B.2
Jiang, W.3
-
10
-
-
0016567534
-
An algorithm for finding nearest neighbors
-
Friedman, J.H., Baskett, F., Shustek, L.J.: An algorithm for finding nearest neighbors. IEEE Trans. Comput. 24(10), 1000–1006 (1975)
-
(1975)
IEEE Trans. Comput
, vol.24
, Issue.10
, pp. 1000-1006
-
-
Friedman, J.H.1
Baskett, F.2
Shustek, L.J.3
-
12
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious rams. J. ACM 43(3), 431–473 (1996)
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
13
-
-
84869456660
-
Secure two-party computation in sublinear (Amortized) time
-
Gordon, S.D., Katz, J., Kolesnikov, V., Krell, F., Malkin, T., Raykova, M., Vahlis, Y.: Secure two-party computation in sublinear (amortized) time. CCS 2012, 513–524 (2012)
-
(2012)
CCS 2012
, pp. 513-524
-
-
Gordon, S.D.1
Katz, J.2
Kolesnikov, V.3
Krell, F.4
Malkin, T.5
Raykova, M.6
Vahlis, Y.7
-
14
-
-
79957834847
-
Processing private queries over untrusted data cloud through privacy homomorphism
-
IEEE
-
Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: ICDE 2011, pp. 601–612. IEEE (2011)
-
(2011)
ICDE 2011
, pp. 601-612
-
-
Hu, H.1
Xu, J.2
Ren, C.3
Choi, B.4
-
16
-
-
85000797782
-
Scaling private set intersection to billion-element sets
-
Christin, N., Safavi-Naini, R. (eds.), Springer, Heidelberg
-
Kamara, S., Mohassel, P., Raykova, M., Sadeghian, S.: Scaling private set intersection to billion-element sets. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 193–213. Springer, Heidelberg (2014)
-
(2014)
FC 2014. LNCS
, vol.8437
, pp. 193-213
-
-
Kamara, S.1
Mohassel, P.2
Raykova, M.3
Sadeghian, S.4
-
17
-
-
84869441394
-
Salus: A system for server-aided secure function evaluation
-
ACM
-
Kamara, S., Mohassel, P., Riva, B.: Salus: a system for server-aided secure function evaluation. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp. 797–808. ACM (2012)
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 797-808
-
-
Kamara, S.1
Mohassel, P.2
Riva, B.3
-
19
-
-
84916199465
-
Efficient, oblivious data structures for MPC
-
Sarkar, P., Iwata, T. (eds.), Springer, Heidelberg
-
Keller, M., Scholl, P.: Efficient, oblivious data structures for MPC. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014, Part II. LNCS, vol. 8874, pp. 506–525. Springer, Heidelberg (2014)
-
(2014)
ASIACRYPT 2014, Part II. LNCS
, vol.8874
, pp. 506-525
-
-
Keller, M.1
Scholl, P.2
-
21
-
-
82955173838
-
Oblivious RAM with O((logN)3) worst-case cost
-
Wang, X., Lee, D.H. (eds.), Springer, Heidelberg
-
Shi, E., Chan, T.-H.H., Stefanov, E., Li, M.: Oblivious RAM with O((logN)3) worst-case cost. In: Wang, X., Lee, D.H. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 197–214. Springer, Heidelberg (2011)
-
(2011)
ASIACRYPT 2011. LNCS
, vol.7073
, pp. 197-214
-
-
Shi, E.1
Chan, T.-H.H.2
Stefanov, E.3
Li, M.4
-
22
-
-
84889005645
-
Path ORAM: An extremely simple Oblivious RAM protocol
-
Stefanov, E., van Dijk, M., Shi, E., Fletcher, C., Ren, L., Yu, X., Devadas, S.: Path ORAM: an extremely simple Oblivious RAM protocol. CCS 2013, 299–310 (2013)
-
(2013)
CCS 2013
, pp. 299-310
-
-
Stefanov, E.1
van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
23
-
-
29144433598
-
Cryptanalysis of an algebraic privacy homomorphism
-
Boyd, C., Mao, W. (eds.), Springer, Heidelberg
-
Wagner, D.: Cryptanalysis of an algebraic privacy homomorphism. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 234–239. Springer, Heidelberg (2003)
-
(2003)
ISC 2003. LNCS
, vol.2851
, pp. 234-239
-
-
Wagner, D.1
-
24
-
-
79960862322
-
Secure and practical outsourcing of linear programming in cloud computing
-
IEEE
-
Wang, C., Ren, K., Wang, J.: Secure and practical outsourcing of linear programming in cloud computing. In: INFOCOM, 2011 Proceedings IEEE, pp. 820–828. IEEE (2011)
-
(2011)
INFOCOM, 2011 Proceedings IEEE
, pp. 820-828
-
-
Wang, C.1
Ren, K.2
Wang, J.3
-
25
-
-
84878119000
-
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing
-
Wang, J., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S., Chen, X.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667–684 (2013)
-
(2013)
Comput. Sci. Inf. Syst
, vol.10
, Issue.2
, pp. 667-684
-
-
Wang, J.1
Ma, H.2
Tang, Q.3
Li, J.4
Zhu, H.5
Ma, S.6
Chen, X.7
-
26
-
-
85066937746
-
Oblivious data structures
-
Wang, X., Nayak, K., Liu, C., Shi, E., Stefanov, E., Huang, Y.: Oblivious data structures. In: CCS 2014 (2014)
-
(2014)
CCS 2014
-
-
Wang, X.1
Nayak, K.2
Liu, C.3
Shi, E.4
Stefanov, E.5
Huang, Y.6
-
27
-
-
70849131456
-
Secure kNN computation on encrypted databases
-
Wong, W.K., Cheung, D.W.L., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: SIGMOD 2009, pp. 139–152 (2009)
-
(2009)
SIGMOD 2009
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.L.2
Kao, B.3
Mamoulis, N.4
-
29
-
-
84881354487
-
Secure nearest neighbor revisited
-
Yao, B., Li, F., Xiao, X.: Secure nearest neighbor revisited. ICDE 2013, 733–744 (2013)
-
(2013)
ICDE 2013
, pp. 733-744
-
-
Yao, B.1
Li, F.2
Xiao, X.3
-
30
-
-
84881219897
-
Circuit structures for improving efficiency of security and privacy tools
-
Zahur, S., Evans, D.: Circuit structures for improving efficiency of security and privacy tools. SP 2013, 493–507 (2013)
-
(2013)
SP 2013
, pp. 493-507
-
-
Zahur, S.1
Evans, D.2
-
31
-
-
84878495668
-
Secure k-nn computation on encrypted cloud data without sharing key with query users
-
ACM
-
Zhu, Y., Xu, R., Takagi, T.: Secure k-nn computation on encrypted cloud data without sharing key with query users. In: Proceedings of the 2013 International Workshop on Security in Cloud Computing, pp. 55–60. ACM (2013)
-
(2013)
Proceedings of the 2013 International Workshop on Security in Cloud Computing
, pp. 55-60
-
-
Zhu, Y.1
Xu, R.2
Takagi, T.3
|