A survey of provably secure searchable encryption

C Bösch, P Hartel, W Jonker, A Peter - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …

Preserving privacy in speaker and speech characterisation

A Nautsch, A Jiménez, A Treiber, J Kolberg… - Computer Speech & …, 2019 - Elsevier
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …

A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data

Z **a, X Wang, X Sun, Q Wang - IEEE transactions on parallel …, 2015 - ieeexplore.ieee.org
Due to the increasing popularity of cloud computing, more and more data owners are
motivated to outsource their data to cloud servers for great convenience and reduced cost in …

Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing

Z Fu, X Sun, Q Liu, L Zhou, J Shu - IEICE Transactions on …, 2015 - search.ieice.org
Cloud computing is becoming increasingly popular. A large number of data are outsourced
to the cloud by data owners motivated to access the large-scale computing resources and …

Practical dynamic searchable encryption with small leakage

E Stefanov, C Papamanthou, E Shi - Cryptology ePrint Archive, 2013 - eprint.iacr.org
Abstract Dynamic Searchable Symmetric Encryption (DSSE) enables a client to encrypt his
document collection in a way that it is still searchable and efficiently updatable. However, all …

Generic attacks on secure outsourced databases

G Kellaris, G Kollios, K Nissim, A O'neill - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
Recently, various protocols have been proposed for securely outsourcing database storage
to a third party server, ranging from systems with" full-fledged" security based on strong …

Privacy-preserving multi-keyword ranked search over encrypted cloud data

N Cao, C Wang, M Li, K Ren… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
With the advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to the commercial public cloud for great flexibility …

VABKS: Verifiable attribute-based keyword search over outsourced encrypted data

Q Zheng, S Xu, G Ateniese - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
It is common nowadays for data owners to outsource their data to the cloud. Since the cloud
cannot be fully trusted, the outsourced data should be encrypted. This however brings a …

Functional encryption: Definitions and challenges

D Boneh, A Sahai, B Waters - Theory of Cryptography: 8th Theory of …, 2011 - Springer
We initiate the formal study of functional encryption by giving precise definitions of the
concept and its security. Roughly speaking, functional encryption supports restricted secret …

Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud

B Wang, S Yu, W Lou, YT Hou - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
Enabling keyword search directly over encrypted data is a desirable technique for effective
utilization of encrypted data outsourced to the cloud. Existing solutions provide multi …