Obfuscated Access and Search Patterns in Searchable Encryption

作者: Florian Kerschbaum , Simon Oya , Andreas Peter , Zhiwei Shang

DOI:

关键词:

摘要: … encrypted database hosted by a server. In a typical SSE scenario, the client first locally produces an encrypted version of the database and a search … documents are encrypted, during …

参考文章(38)
David Cash, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cătălin Roşu, Michael Steiner, Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries international cryptology conference. ,vol. 2013, pp. 353- 373 ,(2013) , 10.1007/978-3-642-40041-4_20
Jonathan Katz, Amit Sahai, Brent Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products international cryptology conference. pp. 146- 162 ,(2008) , 10.1007/978-3-540-78967-3_9
Oded Goldreich, Rafail Ostrovsky, Software protection and simulation on oblivious RAMs Journal of the ACM. ,vol. 43, pp. 431- 473 ,(1996) , 10.1145/233551.233553
Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, Constant Communication ORAM with Small Blocksize computer and communications security. pp. 862- 873 ,(2015) , 10.1145/2810103.2813701
Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter, Dynamic Searchable Encryption via Blind Storage ieee symposium on security and privacy. pp. 639- 654 ,(2014) , 10.1109/SP.2014.47
Cynthia Dwork, Aaron Roth, The Algorithmic Foundations of Differential Privacy ,(2014)
David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart, Leakage-Abuse Attacks Against Searchable Encryption computer and communications security. pp. 668- 679 ,(2015) , 10.1145/2810103.2813700
Xiao Wang, Hubert Chan, Elaine Shi, Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound computer and communications security. pp. 850- 861 ,(2015) , 10.1145/2810103.2813634
Cynthia Dwork, Differential privacy: a survey of results theory and applications of models of computation. ,vol. 4978, pp. 1- 19 ,(2008) , 10.1007/978-3-540-79228-4_1
Mingzhong Wang, Yu-an Tan, Chang Liu, Liehuang Zhu, Search pattern leakage in searchable encryption: Attacks and new construction Information Sciences. ,vol. 265, pp. 176- 188 ,(2014) , 10.1016/J.INS.2013.11.021