Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, Journal of Cryptology, vol.32, issue.3, pp.350-391, 2008. ,
DOI : 10.1007/s00145-007-9006-6
URL : https://hal.archives-ouvertes.fr/hal-00918362
Order preserving encryption for numeric data, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, 2004. ,
DOI : 10.1145/1007568.1007632
Deterministic and Efficiently Searchable Encryption, Proceedings of the 27th Annual International Cryptology Conference, 2007. ,
DOI : 10.1007/978-3-540-74143-5_30
Achieving Full Security in Privacy-Preserving Data Mining, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, 2011. ,
DOI : 10.1109/PASSAT/SocialCom.2011.12
Secure and Efficient Outsourcing of Sequence Comparisons, Proceedings of the 17th European Symposium on Research in Computer Security, 2012. ,
DOI : 10.1007/978-3-642-33167-1_29
Conjunctive, Subset, and Range Queries on Encrypted Data, Proceedings of the 4th IACR Theory of Cryptography Conference, 2007. ,
DOI : 10.1007/978-3-540-70936-7_29
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP, Advances in Cryptology -CRYPTO 2012, pp.868-886, 2012. ,
DOI : 10.1007/978-3-642-32009-5_50
Fully homomorphic encryption without bootstrapping, Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, 2012. ,
Privacy-preserving multi-keyword ranked search over encrypted cloud data, Proceedings of the 30th IEEE International Conference on Computer Communications, 2011. ,
Privacy Preserving Keyword Searches on Remote Encrypted Data, Proceedings of the 3rd International Conference on Applied Cryptography and Network Security, 2005. ,
DOI : 10.1007/11496137_30
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols, Proceedings of the 8th International Conference on Cryptology in India, 2007. ,
DOI : 10.1007/978-3-540-77026-8_21
Searchable symmetric encryption, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006. ,
DOI : 10.1145/1180405.1180417
Private data indexes for selective access to outsourced data, Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, 2011. ,
A fully homomorphic encryption scheme, 2009. ,
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, 2009. ,
DOI : 10.1145/1536414.1536440
Secure indexes. Cryptology ePrint Archive, Report, vol.216216, 2003. ,
The foundations of cryptography -volume 2, basic applications, 2004. ,
Information retrieval: algorithms and heuristics. Kluwer international series on information retrieval, 2004. ,
DOI : 10.1007/978-1-4020-3005-5
Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series), 2007. ,
Efficient Similarity Search over Encrypted Data, 2012 IEEE 28th International Conference on Data Engineering, 2012. ,
DOI : 10.1109/ICDE.2012.23
Boolean symmetric searchable encryption, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, 2013. ,
DOI : 10.1145/2484313.2484347
URL : https://hal.archives-ouvertes.fr/hal-00952541
A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data, 2013 IEEE Sixth International Conference on Cloud Computing, 2013. ,
DOI : 10.1109/CLOUD.2013.18
Practical techniques for searches on encrypted data, Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000. ,
Confidentiality-preserving rank-ordered search, Proceedings of the 2007 ACM workshop on Storage security and survivability , StorageSS '07, 2007. ,
DOI : 10.1145/1314313.1314316
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data, IEEE Transactions on Parallel and Distributed Systems, vol.23, issue.8, pp.1467-1479, 2012. ,
DOI : 10.1109/TPDS.2011.282
Achieving usable and privacy-assured similarity search over outsourced cloud data, 2012 Proceedings IEEE INFOCOM, 2012. ,
DOI : 10.1109/INFCOM.2012.6195784
Managing Gigabytes: Compressing and Indexing Documents and Images, IEEE Transactions on Information Theory, vol.41, issue.6, 1999. ,
DOI : 10.1109/TIT.1995.476344
Exploring the similarity space, ACM SIGIR Forum, vol.32, issue.1, pp.18-34, 1998. ,
DOI : 10.1145/281250.281256