Structured encryption and dynamic leakage suppression
From MaRDI portal
Publication:2056799
DOI10.1007/978-3-030-77883-5_13zbMath1479.94178OpenAlexW3167212082MaRDI QIDQ2056799
Marilyn George, Seny Kamara, Tarik Moataz
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-77883-5_13
Related Items (2)
Snapshot-oblivious RAMs: sub-logarithmic efficiency for short transcripts ⋮ Limits of breach-resistant and snapshot-oblivious RAMs
Cites Work
- Unnamed Item
- Unnamed Item
- Sorting in \(c \log n\) parallel steps
- SQL on structurally-encrypted databases
- Structured encryption and leakage suppression
- Searchable encryption with optimal locality: achieving sublogarithmic read efficiency
- Computationally volume-hiding structured encryption
- TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
- Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
- Structured Encryption and Controlled Disclosure
- Oblivious RAM with O((logN)3) Worst-Case Cost
- Software protection and simulation on oblivious RAMs
- Path ORAM
- Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity
- Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations
- The Locality of Searchable Symmetric Encryption
- Tight tradeoffs in searchable symmetric encryption
This page was built for publication: Structured encryption and dynamic leakage suppression