Searchable encryption for healthcare clouds: A survey

R Zhang, R Xue, L Liu - IEEE Transactions on Services …, 2017 - ieeexplore.ieee.org
Outsourcing medical data and their search services to a third party cloud have been a
popular trend for many medical practices, because using healthcare cloud services can help …

Searchable symmetric encryption: improved definitions and efficient constructions

R Curtmola, J Garay, S Kamara… - Proceedings of the 13th …, 2006 - dl.acm.org
Searchable symmetric encryption (SSE) allows a party to outsource the storage of its data to
another party (a server) in a private manner, while maintaining the ability to selectively …

Trapdoors for hard lattices and new cryptographic constructions

C Gentry, C Peikert, V Vaikuntanathan - Proceedings of the fortieth …, 2008 - dl.acm.org
We show how to construct a variety of" trapdoor" cryptographic tools assuming the worst-
case hardness of standard lattice problems (such as approximating the length of the shortest …

Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization

B Waters - International workshop on public key cryptography, 2011 - Springer
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE)
under concrete and noninteractive cryptographic assumptions in the standard model. Our …

Cryptographic cloud storage

S Kamara, K Lauter - … Conference on Financial Cryptography and Data …, 2010 - Springer
We consider the problem of building a secure cloud storage service on top of a public cloud
infrastructure where the service provider is not completely trusted by the customer. We …

Highly-scalable searchable symmetric encryption with support for boolean queries

D Cash, S Jarecki, C Jutla, H Krawczyk… - Advances in Cryptology …, 2013 - Springer
This work presents the design and analysis of the first searchable symmetric encryption
(SSE) protocol that supports conjunctive search and general Boolean queries on outsourced …

Conjunctive, subset, and range queries on encrypted data

D Boneh, B Waters - Theory of Cryptography: 4th Theory of Cryptography …, 2007 - Springer
We construct public-key systems that support comparison queries (x≥ a) on encrypted data
as well as more general queries such as subset queries (x∈ S). Furthermore, these systems …

Outsourcing the decryption of {ABE} ciphertexts

M Green, S Hohenberger, B Waters - 20th USENIX security symposium …, 2011 - usenix.org
Attribute-based encryption (ABE) is a new vision for public key encryption that allows users
to encrypt and decrypt messages based on user attributes. For example, a user can create a …

Predicate encryption supporting disjunctions, polynomial equations, and inner products

J Katz, A Sahai, B Waters - … 2008: 27th Annual International Conference on …, 2008 - Springer
Predicate encryption is a new paradigm generalizing, among other things, identity-based
encryption. In a predicate encryption scheme, secret keys correspond to predicates and …

Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions

B Waters - Annual international cryptology conference, 2009 - Springer
We present a new methodology for proving security of encryption systems using what we
call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption …