System and method for dynamic, non-interactive, and parallelizable searchable symmetric encryption

作者: Attila Yavuz , Merchan Jorge Guajardo , Raji Anvesh

DOI:

关键词:

摘要: A method of searching encrypted data includes generating with a client computing device search index identifier corresponding to term in an table and transmitting the identifier, first single use key second server. The set decrypted server for using decrypt portion data. further identifying one or more files stored on that include based from table, file identifiers device.

参考文章(18)
David Cash, Stefano Tessaro, The Locality of Searchable Symmetric Encryption theory and application of cryptographic techniques. pp. 351- 368 ,(2014) , 10.1007/978-3-642-55220-5_20
Helger Lipmaa, Phillip Rogaway, David Wagner, Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption ,(2000)
Darrell J. Cannon, Rahul V. Auradkar, Roy Peter D'Souza, Containerless data for trustworthy computing and data services ,(2010)
Seny F. Kamara, Thomas M. Roeder, Searchable symmetric encryption with dynamic updating ,(2010)
Charalampos Papamanthou, Seny Fakaba Kamara, Dynamic symmetric searchable encryption ,(2011)
Rahul V. Auradkar, Roy Peter D'souza, Trusted cloud computing and services framework ,(2010)
Sanguthevar Rajasekaran, Rammohan Varadarajan, Techniques for searching encrypted files ,(2002)
Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, Pieter Hartel, Willem Jonker, Computationally efficient searchable symmetric encryption very large data bases. pp. 87- 100 ,(2010) , 10.1007/978-3-642-15546-8_7
Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin, Seung Geol Choi, Wesley George, Angelos Keromytis, Steve Bellovin, None, Blind Seer: A Scalable Private DBMS ieee symposium on security and privacy. pp. 359- 374 ,(2014) , 10.1109/SP.2014.30
Emil Stefanov, Charalampos Papamanthou, Elaine Shi, Practical Dynamic Searchable Encryption with Small Leakage network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23298