Private search on key-value stores with hierarchical indexes

H Hu, J Xu, X Xu, K Pei, B Choi… - 2014 IEEE 30th …, 2014 - ieeexplore.ieee.org
Query processing that preserves both the query privacy at the client and the data privacy at
the server is a new research problem. It has many practical applications, especially when …

Processing private queries over untrusted data cloud through privacy homomorphism

H Hu, J Xu, C Ren, B Choi - 2011 IEEE 27th International …, 2011 - ieeexplore.ieee.org
Query processing that preserves both the data privacy of the owner and the query privacy of
the client is a new research problem. It shows increasing importance as cloud computing …

Privacy-preserving ranked search on public-key encrypted data

S Buyrukbilen, S Bakiras - 2013 IEEE 10th International …, 2013 - ieeexplore.ieee.org
The massive production of digital data and the complexity of the underlying data
management, motivate individuals and enterprises to outsource their computational needs …

An efficient and privacy-preserving range query over encrypted cloud data

W Wang, Y Jin, B Cao - … Conference on Privacy, Security & Trust …, 2022 - ieeexplore.ieee.org
The growing power of cloud computing prompts data owners to outsource their databases to
the cloud. In order to meet the demand of multi-dimensional data processing in big data era …

SHECS-PIR: somewhat homomorphic encryption-based compact and scalable private information retrieval

J Park, M Tibouchi - European Symposium on Research in Computer …, 2020 - Springer
Abstract A Private Information Retrieval (PIR) protocol allows a client to retrieve arbitrary
elements from a database stored in a server without revealing to the server any information …

Optimized search-and-compute circuits and their application to query evaluation on encrypted data

JH Cheon, M Kim, M Kim - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Private query processing on encrypted databases allows users to obtain data from
encrypted databases in such a way that the users' sensitive data will be protected from …

Private database queries using somewhat homomorphic encryption

D Boneh, C Gentry, S Halevi, F Wang… - Applied Cryptography and …, 2013 - Springer
In a private database query system, a client issues queries to a database and obtains the
results without learning anything else about the database and without the server learning …

Durasift: A robust, decentralized, encrypted database supporting private searches with complex policy controls

BH Falk, S Lu, R Ostrovsky - Proceedings of the 18th ACM Workshop on …, 2019 - dl.acm.org
Several important lines of research have been geared toward the ability to search on
encrypted data. Techniques such as Symmetric Searchable Encryption (SSE), Private …

Privacy-preserving complex query evaluation over semantically secure encrypted data

BK Samanthula, W Jiang, E Bertino - … 7-11, 2014. Proceedings, Part I 19, 2014 - Springer
In the last decade, several techniques have been proposed to evaluate different types of
queries (eg, range and aggregate queries) over encrypted data in a privacy-preserving …

Private compound wildcard queries using fully homomorphic encryption

M Kim, HT Lee, S Ling, BHM Tan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Fully homomorphic encryption (FHE) brings a paradigm shift in cryptographic engineering
by enabling us to resolve various unsolved problems. Among them, this work solves the …