How to construct pseudo-random permutations from pseudo-random functions
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Software protection and simulation on oblivious RAMs
Journal of the ACM (JACM)
On the construction of pseudo-random permutations: Luby-Rackoff revisited (extended abstract)
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Foundations of Cryptography: Basic Tools
Foundations of Cryptography: Basic Tools
Efficient Sharing of Encrypted Data
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Practical Techniques for Searches on Encrypted Data
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Searchable symmetric encryption: improved definitions and efficient constructions
Proceedings of the 13th ACM conference on Computer and communications security
Fast nGram-based string search over data encoded using algebraic signatures
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Privacy-preserving data analytics as an outsourced service
Proceedings of the 2008 ACM workshop on Secure web services
Towards an Information Theoretic Analysis of Searchable Encryption
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Towards Robust Computation on Encrypted Data
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Search-as-a-service: Outsourced search over outsourced storage
ACM Transactions on the Web (TWEB)
Multiuser private queries over encrypted databases
International Journal of Applied Cryptography
Secure anonymous database search
Proceedings of the 2009 ACM workshop on Cloud computing security
Biometric Identification over Encrypted Data Made Feasible
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Provably-secure schemes for basic query support in outsourced databases
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Public key encryption that allows PIR queries
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Deterministic and efficiently searchable encryption
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Private query on encrypted data in multi-user settings
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Fuzzy keyword search over encrypted data in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
A privacy-preserving scheme for online social networks with efficient revocation
INFOCOM'10 Proceedings of the 29th conference on Information communications
Searching keywords with wildcards on encrypted data
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Joining privately on outsourced data
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Computationally efficient searchable symmetric encryption
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
An efficient public key encryption with conjunctive-subset keywords search
Journal of Network and Computer Applications
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Public-key encryption with registered keyword search
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
On a security model of conjunctive keyword search over encrypted relational database
Journal of Systems and Software
Adaptive, secure, and scalable distributed data outsourcing: a vision paper
Proceedings of the 2011 workshop on Dynamic distributed data-intensive applications, programming abstractions, and systems
Privacy enhanced access control by means of policy blinding
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Searchable encryption for outsourced data analytics
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Conjunctive wildcard search over encrypted data
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Silverline: toward data confidentiality in storage-intensive cloud applications
Proceedings of the 2nd ACM Symposium on Cloud Computing
Private search in the real world
Proceedings of the 27th Annual Computer Security Applications Conference
Poster: inference attacks against searchable encryption protocols
Proceedings of the 18th ACM conference on Computer and communications security
Efficient conjunctive keyword search on encrypted data storage system
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Efficient oblivious transfers with access control
Computers & Mathematics with Applications
Secure and privacy preserving keyword searching for cloud storage services
Journal of Network and Computer Applications
Achieving efficient conjunctive keyword searches over encrypted data
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Secure data management in the cloud
DNIS'11 Proceedings of the 7th international conference on Databases in Networked Information Systems
Cooperative private searching in clouds
Journal of Parallel and Distributed Computing
Secure multidimensional range queries over outsourced data
The VLDB Journal — The International Journal on Very Large Data Bases
Efficient and secure ranked multi-keyword search on encrypted cloud data
Proceedings of the 2012 Joint EDBT/ICDT Workshops
PRISM: privacy-preserving search in mapreduce
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Dynamic searchable symmetric encryption
Proceedings of the 2012 ACM conference on Computer and communications security
Public key encryption with conjunctive keyword search and its extension to a multi-user system
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Selective document retrieval from encrypted database
ISC'12 Proceedings of the 15th international conference on Information Security
Secure keyword search using bloom filter with specified character positions
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Privacy-preserving noisy keyword search in cloud computing
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Privacy-aware searching with oblivious term matching for cloud storage
The Journal of Supercomputing
A general transformation from KP-ABE to searchable encryption
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Provable Security for Outsourcing Database Operations
International Journal of Information Security and Privacy
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Boolean symmetric searchable encryption
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Secure cloud-assisted location based reminder
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Outsourced symmetric private information retrieval
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Supporting complex queries and access policies for multi-user encrypted databases
Proceedings of the 2013 ACM workshop on Cloud computing security workshop
Efficient privacy-aware search over encrypted databases
Proceedings of the 4th ACM conference on Data and application security and privacy
Efficient multi-keyword ranked query over encrypted data in cloud computing
Future Generation Computer Systems
A general transformation from KP-ABE to searchable encryption
Future Generation Computer Systems
Search pattern leakage in searchable encryption: Attacks and new construction
Information Sciences: an International Journal
An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking
Distributed and Parallel Databases
Searchable symmetric encryption: Improved definitions and efficient constructions
Journal of Computer Security
Hi-index | 0.00 |
We consider the following problem: a user $\mathcal{U}$ wants to store his files in an encrypted form on a remote file server $\mathcal{S}$. Later the user $\mathcal{U}$ wants to efficiently retrieve some of the encrypted files containing (or indexed by) specific keywords, keeping the keywords themselves secret and not jeopardizing the security of the remotely stored files. For example, a user may want to store old e-mail messages encrypted on a server managed by Yahoo or another large vendor, and later retrieve certain messages while travelling with a mobile device. In this paper, we offer solutions for this problem under well-defined security requirements. Our schemes are efficient in the sense that no public-key cryptosystem is involved. Indeed, our approach is independent of the encryption method chosen for the remote files. They are also incremental, in that $\mathcal{U}$ can submit new files which are secure against previous queries but still searchable against future queries.