Related references
Note: Only part of the references are listed.Computationally Volume-Hiding Structured Encryption
Seny Kamara et al.
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II (2019)
Hardening Database Padding for Searchable Encryption
Lei Xu et al.
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019) (2019)
Arx: An Encrypted Database using Semantically Secure Encryption
Rishabh Poddar et al.
PROCEEDINGS OF THE VLDB ENDOWMENT (2019)
Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern
Jing Yao et al.
IEEE ACCESS (2018)
Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds
Jingwei Li et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2017)
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing
Thang Hoang et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
Changyu Dong et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates
Kee Sung Kim et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
Raphael Bost et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
Leakage-Abuse Attacks against Order-Revealing Encryption
Paul Grubbs et al.
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)
Leakage-Abuse Attacks Against Searchable Encryption
David Cash et al.
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)
Search pattern leakage in searchable encryption: Attacks and new construction
Chang Liu et al.
INFORMATION SCIENCES (2014)
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
David Cash et al.
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014) (2014)
An algorithm for suffix stripping
M. F. Porter
PROGRAM-ELECTRONIC LIBRARY AND INFORMATION SYSTEMS (2006)