[PDF][PDF] Secure Indexes
EJ Goh - IACR ePrint, 2003 - iacr.steepath.eu
A secure index is a data structure that allows a querier with a``trapdoor''for a word x to test in
O (1) time only if the index contains x; The index reveals no information about its contents …
O (1) time only if the index contains x; The index reveals no information about its contents …
Forward and backward private searchable encryption from constrained cryptographic primitives
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can
securely outsource a database to an untrusted server, in such a way that the database can …
securely outsource a database to an untrusted server, in such a way that the database can …
Redactable blockchain–or–rewriting history in bitcoin and friends
We put forward a new framework that makes it possible to re-write or compress the content
of any number of blocks in decentralized services exploiting the blockchain technology. As …
of any number of blocks in decentralized services exploiting the blockchain technology. As …
Formalizing data deletion in the context of the right to be forgotten
The right of an individual to request the deletion of their personal data by an entity that might
be storing it–referred to as the right to be forgotten–has been explicitly recognized …
be storing it–referred to as the right to be forgotten–has been explicitly recognized …
[PDF][PDF] Pan-Private Streaming Algorithms.
Collectors of confidential data, such as governmental agencies, hospitals, or search engine
providers, can be pressured to permit data to be used for purposes other than that for which …
providers, can be pressured to permit data to be used for purposes other than that for which …
Efficient sparse merkle trees: Caching strategies and secure (non-) membership proofs
A sparse Merkle tree is an authenticated data structure based on a perfect Merkle tree of
intractable size. It contains a distinct leaf for every possible output from a cryptographic hash …
intractable size. It contains a distinct leaf for every possible output from a cryptographic hash …
Why your encrypted database is not secure
Encrypted databases, a popular approach to protecting data from compromised database
management systems (DBMS's), use abstract threat models that capture neither realistic …
management systems (DBMS's), use abstract threat models that capture neither realistic …
Peacock hashing: Deterministic and updatable hashing for high performance networking
Hash tables are extensively used in networking to implement data-structures that associate
a set of keys to a set of values, as they provide O (1), query, insert and delete operations …
a set of keys to a set of values, as they provide O (1), query, insert and delete operations …
Arx: An encrypted database using semantically secure encryption
In recent years, encrypted databases have emerged as a promising direction that provides
data confidentiality without sacrificing functionality: queries are executed on encrypted data …
data confidentiality without sacrificing functionality: queries are executed on encrypted data …
A probabilistic separation logic
Probabilistic independence is a useful concept for describing the result of random sampling—
a basic operation in all probabilistic languages—and for reasoning about groups of random …
a basic operation in all probabilistic languages—and for reasoning about groups of random …