Structured encryption and leakage suppression
From MaRDI portal
Publication:1673399
DOI10.1007/978-3-319-96884-1_12zbMATH Open1444.94074OpenAlexW2883042185MaRDI QIDQ1673399FDOQ1673399
Authors: Seny Kamara, Tarik Moataz, Olya Ohrimenko
Publication date: 12 September 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-96884-1_12
Recommendations
- Structured encryption and dynamic leakage suppression
- Structured encryption and controlled disclosure
- Efficient fully secure leakage-deterring encryption
- Verifiable structured encryption
- Structure-preserving public-key encryption with leakage-resilient CCA security
- Leakage resilient fully homomorphic encryption
- Leakage resilient ElGamal encryption
- Leakage-resilient public-key encryption from obfuscation
- Structure preserving CCA secure encryption and applications
- Practical leakage-resilient symmetric cryptography
Cited In (21)
- Weighted oblivious RAM, with applications to searchable symmetric encryption
- Privacy-preserving pattern matching on encrypted data
- Improved structured encryption for SQL databases via hybrid indexing
- Structured encryption and controlled disclosure
- SSE and SSD: page-efficient searchable symmetric encryption
- SQL on structurally-encrypted databases
- Injection-secure structured and searchable symmetric encryption
- Snapshot-oblivious RAMs: sub-logarithmic efficiency for short transcripts
- Encrypted key-value stores
- Limits of breach-resistant and snapshot-oblivious RAMs
- Structured encryption for knowledge graphs
- Multi-user image retrieval with suppression of search pattern leakage
- Structured encryption algorithm for text cryptography
- Full Database Reconstruction with Access and Search Pattern Leakage
- Computationally volume-hiding structured encryption
- Efficient Boolean search over encrypted data with reduced leakage
- Structured encryption and dynamic leakage suppression
- Efficient fully secure leakage-deterring encryption
- Encrypted multi-map that hides query, access, and volume patterns
- Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric
- Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model
This page was built for publication: Structured encryption and leakage suppression
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1673399)