Liu, Zhe ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > Computer Science and Communications Research Unit (CSC)
Ling, Yun
Wei, Guiyi
External co-authors :
yes
Language :
English
Title :
Hidden-Token Searchable Public-Key Encryption
Publication date :
August 2017
Event name :
The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications - IEEE TrustCom-17
Event date :
from 01-08-2017 to 04-08-2017
Audience :
International
Main work title :
The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications - IEEE TrustCom-17
M. T. Goodrich and M. Mitzenmacher, "Privacy-preserving access of outsourced data via oblivious ram simulation," in International Colloquium on Automata, Languages, and Programming. Springer, 2011, pp. 576-587
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia, "Privacy-preserving group data access via stateless oblivious ram simulation," in Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 2012, pp. 157-167
C. Gentry and Z. Ramzan, "Single-database private information retrieval with constant communication rate," in International Colloquium on Automata, Languages, and Programming. Springer, 2005, pp. 803-815
S. Yekhanin, "Private information retrieval," Communications of the ACM, vol. 53, no. 4, pp. 68-73, 2010
D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on. IEEE, 2000, pp. 44-55
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," CCS06, pp. 79-88, 2006
C. Zuo, J. Macindoe, S. Yang, R. Steinfeld, and J. K. Liu, "Trusted boolean search on cloud using searchable symmetric encryption," Trust-Com, vol. 16, pp. 113-120
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 2004, pp. 506-522
Y.-C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," in International Conference on Applied Cryptography and Network Security. Springer, 2005, pp. 442-455
S. Kamara, C. Papamanthou, and T. Roeder, "Dynamic searchable symmetric encryption," in Proceedings of the 2012 ACM conference on Computer and communications security. ACM, 2012, pp. 965-976
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Roşu, and M. Steiner, "Highly-scalable searchable symmetric encryption with support for boolean queries," in Advances in Cryptology-CRYPTO 2013. Springer, 2013, pp. 353-373
S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, "Outsourced symmetric private information retrieval," in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 2013, pp. 875-888
D. Cash, J. Jaeger, S. Jarecki, C. S. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner, "Dynamic searchable encryption in very-large databases: Data structures and implementation." in NDSS, vol. 14. Citeseer, 2014, pp. 23-26
M. Chase and S. Kamara, "Structured encryption and controlled disclosure," in International Conference on the Theory and Application of Cryptology and Information Security. Springer, 2010, pp. 577-594
E. De Cristofaro, Y. Lu, and G. Tsudik, "Efficient techniques for privacypreserving sharing of sensitive information," in International Conference on Trust and Trustworthy Computing. Springer, 2011, pp. 239-253
J. Baek, R. Safavi-Naini, and W. Susilo, "Public key encryption with keyword search revisited," in International conference on Computational Science and Its Applications. Springer, 2008, pp. 1249-1259
H. S. Rhee, J. H. Park, W. Susilo, and D. H. Lee, "Trapdoor security in a searchable public-key encryption scheme with a designated tester," Journal of Systems and Software, vol. 83, no. 5, pp. 763-771, 2010
B. Zhu, B. Zhu, and K. Ren, "Peksrand: Providing predicate privacy in public-key encryption with keyword search," in Communications (ICC), 2011 IEEE International Conference on. IEEE, 2011, pp. 1-6
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Annual International Cryptology Conference. Springer, 2001, pp. 213-229.