M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno et al., Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, Journal of Cryptology, vol.32, issue.3, pp.350-391, 2008.
DOI : 10.1007/s00145-007-9006-6

URL : https://hal.archives-ouvertes.fr/hal-00918362

R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Order preserving encryption for numeric data, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, 2004.
DOI : 10.1145/1007568.1007632

M. Bellare, A. Boldyreva, and A. O. Neill, Deterministic and Efficiently Searchable Encryption, Proceedings of the 27th Annual International Cryptology Conference, 2007.
DOI : 10.1007/978-3-540-74143-5_30

M. Blanton, Achieving Full Security in Privacy-Preserving Data Mining, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, 2011.
DOI : 10.1109/PASSAT/SocialCom.2011.12

M. Blanton, M. J. Atallah, K. B. Frikken, and Q. M. Malluhi, Secure and Efficient Outsourcing of Sequence Comparisons, Proceedings of the 17th European Symposium on Research in Computer Security, 2012.
DOI : 10.1007/978-3-642-33167-1_29

D. Boneh and B. Waters, Conjunctive, Subset, and Range Queries on Encrypted Data, Proceedings of the 4th IACR Theory of Cryptography Conference, 2007.
DOI : 10.1007/978-3-540-70936-7_29

Z. Brakerski, Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP, Advances in Cryptology -CRYPTO 2012, pp.868-886, 2012.
DOI : 10.1007/978-3-642-32009-5_50

Z. Brakerski, C. Gentry, and V. Vaikuntanathan, Fully homomorphic encryption without bootstrapping, Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, 2012.

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, Privacy-preserving multi-keyword ranked search over encrypted cloud data, Proceedings of the 30th IEEE International Conference on Computer Communications, 2011.

Y. Chang and M. Mitzenmacher, Privacy Preserving Keyword Searches on Remote Encrypted Data, Proceedings of the 3rd International Conference on Applied Cryptography and Network Security, 2005.
DOI : 10.1007/11496137_30

G. D. Crescenzo and V. Saraswat, Public Key Encryption with Searchable Keywords Based on Jacobi Symbols, Proceedings of the 8th International Conference on Cryptology in India, 2007.
DOI : 10.1007/978-3-540-77026-8_21

R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006.
DOI : 10.1145/1180405.1180417

S. D. Di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, Private data indexes for selective access to outsourced data, Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, 2011.

C. Gentry, A fully homomorphic encryption scheme, 2009.

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, 2009.
DOI : 10.1145/1536414.1536440

E. Goh, Secure indexes. Cryptology ePrint Archive, Report, vol.216216, 2003.

O. Goldreich, The foundations of cryptography -volume 2, basic applications, 2004.

D. Grossman and O. Frieder, Information retrieval: algorithms and heuristics. Kluwer international series on information retrieval, 2004.
DOI : 10.1007/978-1-4020-3005-5

J. Katz and Y. Lindell, Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series), 2007.

M. Kuzu, M. S. Islam, and M. Kantarcioglu, Efficient Similarity Search over Encrypted Data, 2012 IEEE 28th International Conference on Data Engineering, 2012.
DOI : 10.1109/ICDE.2012.23

T. Moataz and A. Shikfa, Boolean symmetric searchable encryption, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, 2013.
DOI : 10.1145/2484313.2484347

URL : https://hal.archives-ouvertes.fr/hal-00952541

C. Orencik, M. Kantarcioglu, and E. Savas, A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data, 2013 IEEE Sixth International Conference on Cloud Computing, 2013.
DOI : 10.1109/CLOUD.2013.18

D. X. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000.

A. Swaminathan, Y. Mao, G. Su, H. Gou, A. L. Varna et al., Confidentiality-preserving rank-ordered search, Proceedings of the 2007 ACM workshop on Storage security and survivability , StorageSS '07, 2007.
DOI : 10.1145/1314313.1314316

C. Wang, N. Cao, K. Ren, and W. Lou, Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data, IEEE Transactions on Parallel and Distributed Systems, vol.23, issue.8, pp.1467-1479, 2012.
DOI : 10.1109/TPDS.2011.282

C. Wang, K. Ren, S. Yu, and K. M. Urs, Achieving usable and privacy-assured similarity search over outsourced cloud data, 2012 Proceedings IEEE INFOCOM, 2012.
DOI : 10.1109/INFCOM.2012.6195784

I. H. Witten, A. Moffat, and T. C. Bell, Managing Gigabytes: Compressing and Indexing Documents and Images, IEEE Transactions on Information Theory, vol.41, issue.6, 1999.
DOI : 10.1109/TIT.1995.476344

J. Zobel and A. Moffat, Exploring the similarity space, ACM SIGIR Forum, vol.32, issue.1, pp.18-34, 1998.
DOI : 10.1145/281250.281256