Privacy Preserving Multi-Proxy Based Encrypted Keyword Search
Abstract
Keywords
References
- P. R. Clearinghouse. Chronology of data breaches. [Online]. Available: http://www.privacyrights.org/data-breach. July 19, 2022.
- N. V. D. C. statistics. [Online]. Available: http://web.nvd.nist. gov/view/vuln/statistics,July19,2022.
- C. Gentry, “Fully homomorphic encryption using ideal lattices,” in STOC, vol. 9, 2009, pp. 169–178.
- R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order preserving encryption for numeric data,” in Proc. of ACM SIGMOD, June 2004.
- A.Boldyreva, N.Chenette, and A.ON ́eill, “Orderpreserving symmetric encryption revisited: improved security analysis and alternative solutions,” in Proc. of CRYPTO, 2011.
- A. Boldyreva, N. Chenette, Y. Lee, and A. ON ́eil, “Order preserving symmetric encryption,” in Proc. of EUROCRYPT, April 2009.
- R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrish- nan, “CryptDB: Protecting confidentiality with encrypted query processing,” in Proc. of SOSP, 2011.
- R. A. Popa, F. H. Li, and N. Zeldovich, “An ideal-security protocol for order-preserving encoding,” in Proc. of Security and Privacy, 2013.
Details
Primary Language
English
Subjects
Computer Software
Journal Section
Research Article
Authors
Özgür Öksüz
*
0000-0001-5568-6116
Türkiye
Publication Date
December 31, 2022
Submission Date
July 23, 2022
Acceptance Date
December 5, 2022
Published in Issue
Year 2022 Volume: 11 Number: 4