-
1
-
-
84984917874
-
-
S. Agrawal, S. Agrawal, S. Badrinarayanan, A. Kumarasubramanian, M. Prabhakaran, and A. Sahai. Function Private Functional Encryption and Property Preserving Encryption: New Definitions and Positive Resuslts. https://eprint.iacr.org/2013/744.
-
Function Private Functional Encryption and Property Preserving Encryption: New Definitions and Positive Resuslts
-
-
Agrawal, S.1
Agrawal, S.2
Badrinarayanan, S.3
Kumarasubramanian, A.4
Prabhakaran, M.5
Sahai, A.6
-
2
-
-
77950347409
-
A view of cloud computing
-
Apirl
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A View of Cloud Computing. Communications of the ACM, 53(4):50-58, Apirl 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
3
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable Data Possession at Untrusted Stores. In Proc. of ACM CCS'07, pages 598-610, 2007.
-
(2007)
Proc. of ACM CCS'07
, pp. 598-610
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
4
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
M. Bellare, A. Boldyreva, and A. O'Neill. Deterministic and Efficiently Searchable Encryption. In Proc. of CRYPTO'07, pages 535-552, 2007.
-
(2007)
Proc. of CRYPTO'07
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
5
-
-
0016557674
-
Multidimensional binary search trees used for associative searching
-
J. L. Bentley. Multidimensional Binary Search Trees Used for Associative Searching. Communications of the ACM, 18(9):509-517, 1975.
-
(1975)
Communications of the ACM
, vol.18
, Issue.9
, pp. 509-517
-
-
Bentley, J.L.1
-
6
-
-
0018480594
-
Decomposable searching problems
-
J. L. Bentley. Decomposable Searching Problems. Information Processing Letters, 8(5):201-244, 1979.
-
(1979)
Information Processing Letters
, vol.8
, Issue.5
, pp. 201-244
-
-
Bentley, J.L.1
-
7
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. Public Key Encryption with Keyword Search. In Proc. of EUROCRYP'04, pages 506-522, 2004.
-
(2004)
Proc. of EUROCRYP'04
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
8
-
-
84869405506
-
Functional encryption: A new vision for public key cryptography
-
D. Boneh, A. Sahai, and B. Waters. Functional Encryption: A New Vision for Public Key Cryptography. Communications of the ACM, 55(11):56-64, 2012.
-
(2012)
Communications of the ACM
, vol.55
, Issue.11
, pp. 56-64
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
9
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters. Conjunctive, Subset, and Range Queries on Encrypted Data. In Proc. of TCC'07, pages 535-554, 2007.
-
(2007)
Proc. of TCC'07
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
10
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (without random oracles)
-
X. Boyen and B. Waters. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In Proc. of CRYPTO'06, pages 290-307, 2006.
-
(2006)
Proc. of CRYPTO'06
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
11
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data. In Proc. of IEEE INFOCOM'11, pages 829-837, 2011.
-
(2011)
Proc. of IEEE INFOCOM'11
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
12
-
-
85178119595
-
Dynamic searchable encryption in very-large databases: Data structures and implementation
-
D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. In Proc. of NDSS'14, 2014.
-
(2014)
Proc. of NDSS'14
-
-
Cash, D.1
Jaeger, J.2
Jarecki, S.3
Jutla, C.4
Krawczyk, H.5
Rosu, M.-C.6
Steiner, M.7
-
13
-
-
84884472579
-
Highly-scalable searchable symmetric encryption with support for boolean queries
-
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. In Proc. of CRYPTO'13, pages 353-373, 2013.
-
(2013)
Proc. of CRYPTO'13
, pp. 353-373
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.3
Krawczyk, H.4
Rosu, M.-C.5
Steiner, M.6
-
14
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Y.-C. Chang and M. Mitzenmacher. Privacy Preserving Keyword Searches on Remote Encrypted Data. In Proc. of ACNS'05, pages 442-455, 2005.
-
(2005)
Proc. of ACNS'05
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
15
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. In Proc. of ACM CCS'06, pages 79-88, 2006.
-
(2006)
Proc. of ACM CCS'06
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
16
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
P. Golle, J. Staddon, and B. Waters. Secure Conjunctive Keyword Search over Encrypted Data. In Proc. of ACNS'04, pages 31-45, 2004.
-
(2004)
Proc. of ACNS'04
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
17
-
-
0021615874
-
R-Trees A dynamic index structure for spatial searching
-
A. Guttman. R-Trees: A Dynamic Index Structure for Spatial Searching. In Proc. of ACM SIGMOD'84, pages 47-57, 1984.
-
(1984)
Proc. of ACM SIGMOD'84
, pp. 47-57
-
-
Guttman, A.1
-
19
-
-
84883285558
-
Parallel and dynamic searchable symmetric encryption
-
S. Kamara and C. Papamanthou. Parallel and Dynamic Searchable Symmetric Encryption. In Proc. of FC, pages 258-274, 2013.
-
(2013)
Proc. of FC
, pp. 258-274
-
-
Kamara, S.1
Papamanthou, C.2
-
22
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In Proc. of EUROCRYPT'08, pages 146-162, 2008.
-
(2008)
Proc. of EUROCRYPT'08
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
23
-
-
84877967287
-
Expressive search on encrypted data
-
J. Lai, X. Zhou, R. H. Deng, Y. Li, and K. Chen. Expressive Search on Encrypted Data. In Proc. of ACM ASIACCS'13, pages 243-251, 2013.
-
(2013)
Proc. of ACM ASIACCS'13
, pp. 243-251
-
-
Lai, J.1
Zhou, X.2
Deng, R.H.3
Li, Y.4
Chen, K.5
-
24
-
-
80051880293
-
Authorized private keyword search over encrypted data in cloud computing
-
M. Li, S. Yu, N. Cao, and W. Lou. Authorized Private Keyword Search over Encrypted Data in Cloud Computing. In Proc. of IEEE ICDCS'11, pages 383-392, 2011.
-
(2011)
Proc. of IEEE ICDCS'11
, pp. 383-392
-
-
Li, M.1
Yu, S.2
Cao, N.3
Lou, W.4
-
25
-
-
84925827178
-
Privacy-preserving logarithmic-time search on encrypted data in cloud
-
Y. Lu. Privacy-Preserving Logarithmic-time Search on Encrypted Data in Cloud. In Proc. of NDSS'12, 2012.
-
(2012)
Proc. of NDSS'12
-
-
Lu, Y.1
-
26
-
-
72449208663
-
Hierarchical predicate encryption for inner-products
-
T. Okamoto and K. Takashima. Hierarchical Predicate Encryption for Inner-Products. In Proc. of ASIACRYPT'09, pages 214-231, 2009.
-
(2009)
Proc. of ASIACRYPT'09
, pp. 214-231
-
-
Okamoto, T.1
Takashima, K.2
-
27
-
-
70350649061
-
Predicate privacy in encryption systems
-
E. Shen, E. Shi, and B. Waters. Predicate Privacy in Encryption Systems. In Proc. of TCC'09, pages 457-473, 2009.
-
(2009)
Proc. of TCC'09
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
28
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
E. Shi, J. Bethencourt, T.-H. H. Chan, D. Song, and A. Perrig. Multi-Dimensional Range Query over Encrypted Data. In Proc. of IEEE S&P'07, pages 350-364, 2007.
-
(2007)
Proc. of IEEE S&P'07
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.-H.H.3
Song, D.4
Perrig, A.5
-
29
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. Song, D. Wagner, and A. Perrig. Practical Techniques for Searches on Encrypted Data. In Proc. of IEEE S&P'00, pages 44-55, 2000.
-
(2000)
Proc. of IEEE S&P'00
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
31
-
-
84889005645
-
Path oram: An extremely simple oblivious ram protocol
-
E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas. Path ORAM: An Extremely Simple Oblivious RAM Protocol. In Proc. of ACM CCS'13, pages 299-310, 2013.
-
(2013)
Proc. of ACM CCS'13
, pp. 299-310
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
32
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li. Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking. In Proc. of ACM AISACCS'13, pages 71-82, 2013.
-
(2013)
Proc. of ACM AISACCS'13
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
33
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou. Secure Ranked Keyword Search over Encrypted Cloud Data. In Proc. of ICDCS'10, pages 253-262, 2010.
-
(2010)
Proc. of ICDCS'10
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
34
-
-
84881329100
-
Secure and efficient range queries on outsourced databases using r-trees
-
P. Wang and C. V. Ravishankar. Secure and Efficient Range Queries on Outsourced Databases Using R-trees. In Proc. of IEEE ICDE'13, pages 314-325, 2013.
-
(2013)
Proc. of IEEE ICDE'13
, pp. 314-325
-
-
Wang, P.1
Ravishankar, C.V.2
-
35
-
-
33750247597
-
Privacy-preserving queries on encrypted data
-
Z. Yang, S. Zhong, and R. N. Wright. Privacy-Preserving Queries on Encrypted Data. In Proc. of ESORICS'06, pages 479-495, 2006.
-
(2006)
Proc. of ESORICS'06
, pp. 479-495
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
-
36
-
-
79960266628
-
GeoEnc: Geometric are based keys and policies in functional encrytion systems
-
M. Zhang and T. Takagi. GeoEnc: geometric are based keys and policies in functional encrytion systems. In Proc. of ACISP'11, pages 241-258, 2011.
-
(2011)
Proc. of ACISP'11
, pp. 241-258
-
-
Zhang, M.1
Takagi, T.2
|