Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
From MaRDI portal
Publication:2845683
DOI10.1007/978-3-642-40041-4_20zbMATH Open1311.68057OpenAlexW1502708590MaRDI QIDQ2845683FDOQ2845683
Authors: Stanislaw Jarecki, Hugo Krawczyk, Marcel-Cătălin Roşu, Michael Steiner, C. S. Jutla
Publication date: 2 September 2013
Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_20
Recommendations
- Dynamic multi-client searchable symmetric encryption with support for Boolean queries
- Toward practical searchable symmetric encryption
- Towards multi-user searchable encryption supporting Boolean query and fast decryption
- Boolean searchable symmetric encryption with worst-case sub-linear complexity
- An efficient non-interactive multi-client searchable encryption with support for Boolean queries
- Efficient searchable symmetric encryption for join queries
- Tight tradeoffs in searchable symmetric encryption
Cited In (60)
- SecGDB: graph encryption for exact shortest distance queries with efficient updates
- An efficient non-interactive multi-client searchable encryption with support for Boolean queries
- Attribute-based keyword search from lattices
- Updatable searchable symmetric encryption: definitions and constructions
- Boolean searchable symmetric encryption with worst-case sub-linear complexity
- Improved structured encryption for SQL databases via hybrid indexing
- Towards efficient and strong backward private searchable encryption with secure enclaves
- Private database access with HE-over-ORAM architecture
- Dynamic multi-client searchable symmetric encryption with support for Boolean queries
- Oblivious keyword search with authorization
- Exipnos: an efficient verifiable dynamic symmetric searchable encryption scheme with forward and backward privacy
- SSE and SSD: page-efficient searchable symmetric encryption
- Publicly verifiable searchable symmetric encryption based on efficient cryptographic components
- Efficient searchable symmetric encryption for join queries
- \textbf{TWORAM:} efficient oblivious RAM in two rounds with applications to searchable encryption
- Private large-scale databases with distributed searchable symmetric encryption
- Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data
- Tight tradeoffs in searchable symmetric encryption
- Encrypted key-value stores
- Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption
- Efficient no-dictionary verifiable searchable symmetric encryption
- Practical private range search in depth
- Building a dynamic searchable encrypted medical database for multi-client
- Fast two-server multi-user searchable encryption with strict access pattern leakage
- Dynamic searchable symmetric encryption with minimal leakage and efficient updates on commodity hardware
- Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations
- Locality-preserving oblivious RAM
- Towards efficient verifiable conjunctive keyword search for large encrypted database
- TOPPSS: cost-minimal password-protected secret sharing based on threshold OPRF
- Toward practical searchable symmetric encryption
- Fast Query Over Encrypted Character Data in Database
- Public Key Encryption with Authorized Keyword Search
- Efficient Boolean search over encrypted data with reduced leakage
- Structured encryption and dynamic leakage suppression
- Deniable searchable symmetric encryption
- A survey on design and implementation of protected searchable data in the cloud
- Searchable symmetric encryption security definitions
- ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage
- Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries
- Practical Attacks on Relational Databases Protected via Searchable Encryption
- Applied homomorphic cryptography: examples
- Expressive query over outsourced encrypted data
- Partitioned searchable encryption
- Low-leakage secure search for Boolean expressions
- MDOPE: efficient multi-dimensional data order preserving encryption scheme
- Publicly verifiable database scheme with efficient keyword search
- Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model
- Passive query-recovery attack against secure conjunctive keyword search schemes
- Searchable symmetric encryption over multiple servers
- Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security
- Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data
- Hermes: I/O-efficient forward-secure searchable symmetric encryption
- Injection-secure structured and searchable symmetric encryption
- Limits of breach-resistant and snapshot-oblivious RAMs
- Structured encryption for knowledge graphs
- Multi-user image retrieval with suppression of search pattern leakage
- Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
- Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud
- Forward private searchable encryption with conjunctive keywords query
- Beyond volume pattern: storage-efficient Boolean searchable symmetric encryption with suppressed leakage
This page was built for publication: Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2845683)