Private combinatorial group testing
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Communication Complexity in Algebraic Two-Party Protocols
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Obfuscating straight line arithmetic programs
Proceedings of the nineth ACM workshop on Digital rights management
Privacy-preserving similarity-based text retrieval
ACM Transactions on Internet Technology (TOIT)
Additively homomorphic encryption with d-operand multiplications
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Private searching on MapReduce
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Private searching for single and conjunctive keywords on streaming data
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Plaintext-Checkable encryption
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
Efficiently shuffling in public
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
On the (im)possibility of projecting property in prime-order setting
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
P3S: a privacy preserving publish-subscribe middleware
Proceedings of the 13th International Middleware Conference
Hub: heterogeneous bucketization for database outsourcing
Proceedings of the 2013 international workshop on Security in cloud computing
Towards practical private processing of database queries over public data
Distributed and Parallel Databases
Hi-index | 0.00 |
In this paper we consider the problem of private searching on streaming data, where we can efficiently implement searching for documents that satisfy a secret criteria (such as the presence or absence of a hidden combination of hidden keywords) under various cryptographic assumptions. Our results can be viewed in a variety of ways: as a generalization of the notion of private information retrieval (to more general queries and to a streaming environment); as positive results on privacy-preserving datamining; and as a delegation of hidden program computation to other machines.