Search Results

1 - 7 of 7 items :

  • "Structured Encryption" x
Clear All
Breach-Resistant Structured Encryption

locality of searchable symmetric encryption. In Advances in Cryptology - EUROCRYPT 2014 , 2014. [10] David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Rosu, and Michael Steiner. Dynamic searchable encryption in very-large databases: Data structures and implementation. In Network and Distributed System Security Symposium (NDSS ‘14) , 2014. [11] Bouncy Castle. Crypto API. In http://www.bouncycastle.org . [12] M. Chase and S. Kamara. Structured encryption and controlled disclosure. In Advances in Cryptology

Open access
Encrypted Databases for Differential Privacy

. [4] G. Acs, C. Castelluccia, and R. Chen. Differentially private histogram publishing through lossy compression. In 2012 IEEE 12th International Conference on Data Mining , pages 1–10. IEEE, 2012. [5] G. Amjad, S. Kamara, and T. Moataz. Breach-resistant structured encryption. IACR Cryptology ePrint Archive , 2018:195, 2018. [6] M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications

Open access
Substring-Searchable Symmetric Encryption

. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner. Dynamic searchable encryption in very-large databases: Data structures and implementation. In NDSS 2014 . The Internet Society, Feb. 2014. [13] M. Chase and S. Kamara. Structured encryption and controlled disclosure. In M. Abe, editor, ASIACRYPT 2010 , volume 6477 of LNCS , pages 577–594. Springer, Dec. 2010. [14] K.-M. Chung, Y. T. Kalai, F.-H. Liu, and R. Raz. Memory delegation. In P. Rogaway, editor, CRYPTO 2011 , volume 6841 of LNCS , pages 151–168. Springer, Aug. 2011. [15] T. H. Cormen, C. E

Open access
Security-Efficiency Tradeoffs in Searchable Encryption

, M. Highly-scalable searchable symmetric encryption with support for Boolean queries. In: R. Canetti and J.A. Garay (eds.), CRYPTO 2013, Part I, LNCS , vol. 8042, pp. 353–373. Springer, Heidelberg (Aug. 2013). [CK10] Chase, M. and Kamara, S. Structured encryption and controlled disclosure. In: M. Abe (ed.), ASIACRYPT 2010, LNCS , vol. 6477, pp. 577–594. Springer, Heidelberg (Dec. 2010). [CT14] Cash, D. and Tessaro, S. The locality of searchable symmetric encryption. In: P.Q. Nguyen and E. Oswald (eds.), EUROCRYPT 2014, LNCS , vol. 8441, pp. 351

Open access
Efficient Dynamic Searchable Encryption with Forward Privacy

preserving keyword searches on remote encrypted data,” in Applied Cryptography and Network Security (ACNS) , 2005. [11] M. Chase and S. Kamara, “Structured encryption and controlled disclosure,” in ASIACRYPT’10 , 2010. [12] R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: Improved definitions and efficient constructions,” in ACM Conference on Computer and Communications Security (CCS) , 2006. [13] I. B. Damgård, “Collision free hash functions and public key signature schemes,” in EUROCRYPT’87 , 1988. [14] S

Open access
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free

Shoup. The helib library, 2015. [32] Yuval Ishai and Eyal Kushilevitz. Randomizing polynomials: A new representation with applications to round-efficient secure computation. In focs , page 294. IEEE, 2000. [33] Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In Ndss , volume 20, page 12, 2012. [34] Seny Kamara, Tarik Moataz, and Olya Ohrimenko. Structured encryption and leakage suppression. In Annual International Cryptology Conference , pages 339

Open access
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset

–CRYPTO 2013 , pages 353–373. Springer, 2013. [16] M. Chase and S. Kamara. Structured encryption and controlled disclosure. In Advances in Cryptology - ASIACRYPT 2010 , volume 6477 of Lecture Notes in Computer Science , pages 577–594, 2010. [17] V. Costan and S. Devadas. Intel SGX explained. Cryptology ePrint Archive, Report 2016/086, 2016. http://eprint.iacr.org/2016/086.pdf . [18] V. Costan, I. Lebedev, S. Devadas, et al. Secure Processors Part II: Intel SGX security analysis and MIT Sanctum Architecture. Foundations and Trends® in Electronic Design

Open access