Privacy Preserving Keyword Searches on Remote Encrypted Data
From MaRDI portal
Publication:3593165
DOI10.1007/11496137_30zbMath1126.68386OpenAlexW2131043660MaRDI QIDQ3593165
Yan-Cheng Chang, Michael Mitzenmacher
Publication date: 24 September 2007
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11496137_30
Related Items (35)
A secure searchable encryption scheme for cloud using hash-based indexing ⋮ Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries ⋮ ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage ⋮ A privacy-preserving multi-keyword search approach in cloud computing ⋮ A query privacy-enhanced and secure search scheme over encrypted data in cloud computing ⋮ On query result integrity over encrypted data ⋮ A survey on design and implementation of protected searchable data in the cloud ⋮ Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing ⋮ M-EDESE: multi-domain, easily deployable, and efficiently searchable encryption ⋮ Encapsulated search index: public-key, sub-linear, distributed, and delegatable ⋮ Exipnos: an efficient verifiable dynamic symmetric searchable encryption scheme with forward and backward privacy ⋮ Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption ⋮ Public key authenticated encryption with keyword search from LWE ⋮ Partitioned searchable encryption ⋮ Efficient oblivious transfers with access control ⋮ Cooperative private searching in clouds ⋮ FSSE: forward secure searchable encryption with keyed-block chains ⋮ Effective error-tolerant keyword search for secure cloud computing ⋮ Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency ⋮ Secure deduplication storage systems supporting keyword search ⋮ Practical Order-Revealing Encryption with Limited Leakage ⋮ Fine-grained searchable encryption in multi-user setting ⋮ Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations ⋮ Searchable symmetric encryption over multiple servers ⋮ Publicly verifiable searchable symmetric encryption based on efficient cryptographic components ⋮ Fuzzy matching: multi-authority attribute searchable encryption without central authority ⋮ Towards Robust Computation on Encrypted Data ⋮ Tight tradeoffs in searchable symmetric encryption ⋮ Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data ⋮ Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware ⋮ DMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User Revocation ⋮ TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption ⋮ Efficient No-dictionary Verifiable Searchable Symmetric Encryption ⋮ Encryption and Fragmentation for Data Confidentiality in the Cloud ⋮ Privacy-Preserving Queries on Encrypted Data
This page was built for publication: Privacy Preserving Keyword Searches on Remote Encrypted Data