4.4 Article

Frequency-Hiding Order-Preserving Encryption with Small Client Storage

Related references

Note: Only part of the references are listed.
Proceedings Paper Computer Science, Information Systems

An Efficiently Searchable Encrypted Data Structure for Range Queries

Florian Kerschbaum et al.

COMPUTER SECURITY - ESORICS 2019, PT II (2019)

Proceedings Paper Computer Science, Information Systems

Encrypted Databases: New Volume Attacks against Range Queries

Zichen Gui et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Article Computer Science, Information Systems

A Comparative Evaluation of Order-Revealing Encryption Schemes and Secure Range-Query Protocols

Dmytro Bogatov et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2019)

Article Computer Science, Information Systems

Arx: An Encrypted Database using Semantically Secure Encryption

Rishabh Poddar et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2019)

Article Computer Science, Information Systems

Multi-Client Order-Revealing Encryption

Jieun Eom et al.

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Theory & Methods

Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries

Paul Grubbs et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Article Computer Science, Information Systems

The Tao of Inference in Privacy-Protected Databases

Vincent Bindschaedler et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2018)

Proceedings Paper Computer Science, Information Systems

Leakage-Abuse Attacks against Order-Revealing Encryption

Paul Grubbs et al.

2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)

Proceedings Paper Computer Science, Information Systems

Practical Order-Revealing Encryption with Limited Leakage

Nathan Chenette et al.

FAST SOFTWARE ENCRYPTION (FSE 2016) (2016)

Proceedings Paper Computer Science, Information Systems

POPE: Partial Order Preserving Encoding

Daniel S. Roche et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Proceedings Paper Computer Science, Information Systems

Generic Attacks on Secure Outsourced Databases

Georgios Kellaris et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Proceedings Paper Computer Science, Information Systems

Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation

Dan Boneh et al.

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II (2015)

Article Computer Science, Hardware & Architecture

CryptDB: Processing Queries on an Encrypted Database

Raluca Ada Popa et al.

COMMUNICATIONS OF THE ACM (2012)

Article Computer Science, Information Systems

MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values

Hasan Kadhem et al.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2010)