Encrypted key-value stores
From MaRDI portal
Publication:2152022
DOI10.1007/978-3-030-65277-7_4zbMath1498.94051OpenAlexW3113181630MaRDI QIDQ2152022
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-65277-7_4
Database theory (68P15) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Data structures (68P05)
Related Items (1)
Zero-knowledge for homomorphic key-value commitments with applications to privacy-preserving ledgers
Cites Work
- Unnamed Item
- SQL on structurally-encrypted databases
- Structured encryption and leakage suppression
- Searchable encryption with optimal locality: achieving sublogarithmic read efficiency
- Computationally volume-hiding structured encryption
- Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
- Structured Encryption and Controlled Disclosure
- Deterministic and Efficiently Searchable Encryption
- Order-Preserving Symmetric Encryption
- Software protection and simulation on oblivious RAMs
- Fully homomorphic encryption using ideal lattices
- Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity
- Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations
- The Locality of Searchable Symmetric Encryption
- Tight tradeoffs in searchable symmetric encryption
This page was built for publication: Encrypted key-value stores