Building practical systems that compute on encrypted data

作者: Raluca Ada Popa

DOI:

关键词: EncryptionSoftware engineeringElectrical engineering technologyComputer science

摘要:

参考文章(174)
Lakshminarayanan Subramanian, Sherman S. M. Chow, Sherman S. M. Chow, Jie-Han Lee, Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases. network and distributed system security symposium. ,(2009)
Edward W. Felten, Michael J. Freedman, Ariel J. Feldman, William P. Zeller, SPORC: group collaboration using untrusted cloud resources operating systems design and implementation. pp. 337- 350 ,(2010) , 10.5555/1924943.1924967
Noam Nisan, Benny Pinkas, Yaron Sella, Dahlia Malkhi, Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) usenix security symposium. ,(2004)
Nickolai Zeldovich, Raluca A. Popa, Hari Balakrishnan, Carlo Curino, Evan P. C. Jones, Samuel Madden, Eugene Wu, Nirmesh Malviya, Relational Cloud: a Database Service for the cloud. conference on innovative data systems research. pp. 235- 240 ,(2011)
Petros Maniatis, Byung-Gon Chun, Jayanthkumar Kannan, Secure data preservers forweb services usenix conference on web application development. pp. 3- 3 ,(2011)
Craig Gentry, Amit Sahai, Brent Waters, Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based international cryptology conference. ,vol. 2013, pp. 75- 92 ,(2013) , 10.1007/978-3-642-40041-4_5
Maxwell Krohn, Building secure high-performance web services with OKWS usenix annual technical conference. pp. 15- 15 ,(2004)
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee, Functional Encryption with Bounded Collusions via Multi-party Computation international cryptology conference. ,vol. 2012, pp. 162- 179 ,(2012) , 10.1007/978-3-642-32009-5_11
Dan Boneh, Hovav Shacham, Nagendra Modadugu, Eu-Jin Goh, SiRiUS: Securing Remote Untrusted Storage. network and distributed system security symposium. ,(2003)
Alex Aiken, Yichen Xie, Static detection of security vulnerabilities in scripting languages usenix security symposium. pp. 13- ,(2006)