Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Executing SQL over encrypted data in the database-service-provider model
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Practical Techniques for Searches on Encrypted Data
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Order-Preserving Symmetric Encryption
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Database Management as a Service: Challenges and Opportunities
ICDE '09 Proceedings of the 2009 IEEE International Conference on Data Engineering
Computationally private information retrieval with polylogarithmic communication
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Conjunctive, subset, and range queries on encrypted data
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Joining privately on outsourced data
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Evaluating 2-DNF formulas on ciphertexts
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Privacy-preserving noisy keyword search in cloud computing
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Hi-index | 0.00 |
Outsourced database provides a solution for data owners who want to delegate the task of answering database queries to service provider. Of essential concern in such framework is data privacy. The data owner may want to keep the database hidden from service provider. Simultaneously, potential clients may desire a mean of privacypreserving computations on outsourced encrypted database. We present a solution of privacy-preserving join query with computational privacy and low overheads. The primary goal of this paper is to provide a set of security notion for such a system as well as a construction which is secure under the newly introduced security notions.