4.7 Article

SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption

Related references

Note: Only part of the references are listed.
Proceedings Paper Computer Science, Information Systems

Computationally Volume-Hiding Structured Encryption

Seny Kamara et al.

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Hardening Database Padding for Searchable Encryption

Lei Xu et al.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019) (2019)

Article Computer Science, Information Systems

Arx: An Encrypted Database using Semantically Secure Encryption

Rishabh Poddar et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2019)

Article Computer Science, Information Systems

Enabling Search Over Encrypted Cloud Data With Concealed Search Pattern

Jing Yao et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds

Jingwei Li et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2017)

Proceedings Paper Computer Science, Information Systems

S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing

Thang Hoang et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing

Changyu Dong et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates

Kee Sung Kim et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

Raphael Bost et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Leakage-Abuse Attacks against Order-Revealing Encryption

Paul Grubbs et al.

2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)

Proceedings Paper Computer Science, Information Systems

Leakage-Abuse Attacks Against Searchable Encryption

David Cash et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)

Article Computer Science, Information Systems

Search pattern leakage in searchable encryption: Attacks and new construction

Chang Liu et al.

INFORMATION SCIENCES (2014)

Proceedings Paper Computer Science, Information Systems

Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation

David Cash et al.

21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014) (2014)

Article Computer Science, Information Systems

An algorithm for suffix stripping

M. F. Porter

PROGRAM-ELECTRONIC LIBRARY AND INFORMATION SYSTEMS (2006)