R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Order preserving encryption for numeric data, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.563-574, 2004.
DOI : 10.1145/1007568.1007632

A. Boldyreva, N. Chenette, and A. O. Neill, Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions, Advances in Cryptology - CRYPTO 2011 -31st Annual Cryptology Conference. Proceedings, pp.578-595, 2011.
DOI : 10.1007/978-3-642-22792-9_33

D. Boneh, G. Di-crescenzo, R. Ostrovsky, and G. Persiano, Public Key Encryption with Keyword Search, EUROCRYPT, pp.506-522, 2004.
DOI : 10.1007/978-3-540-24676-3_30

D. Boneh and B. Waters, Conjunctive, Subset, and Range Queries on Encrypted Data, Theory of Cryptography, 4th Theory of Cryptography Conference Proceedings, pp.535-554, 2007.
DOI : 10.1007/978-3-540-70936-7_29

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-70936-7_29.pdf

B. Chor, N. Gilboa, and M. Naor, Private information retrieval by keywords, IACR Cryptology ePrint Archive, 1998.

B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, Private information retrieval, Journal of the ACM, vol.45, issue.6, pp.965-981, 1998.
DOI : 10.1145/293347.293350

G. , D. Crescenzo, D. Cook, A. Mcintosh, and E. Panagos, Practical private information retrieval from a time-varying, multi-attribute, and multiple-occurrence database, Data and Applications Security and Privacy XXVIII -28th Annual IFIP WG 11.3 Working Conference. Proceedings, pp.339-355, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01284868

G. , D. Crescenzo, Y. Ishai, and R. Ostrovsky, Universal service-providers for private information retrieval, J. Cryptology, vol.14, issue.1, pp.37-74, 2001.

G. , D. Crescenzo, and D. Shallcross, On minimizing the size of encrypted databases, DBSec, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01284872

M. J. Freedman, Y. Ishai, B. Pinkas, and O. Reingold, Keyword Search and Oblivious Pseudorandom Functions, TCC, pp.303-324, 2005.
DOI : 10.1007/978-3-540-30576-7_17

O. Goldreich, S. Goldwasser, and S. Micali, How to construct random functions, Journal of the ACM, vol.33, issue.4, pp.792-807, 1986.
DOI : 10.1145/6490.6503

O. Goldreich and R. Ostrovsky, Software protection and simulation on oblivious RAMs, Journal of the ACM, vol.43, issue.3, pp.431-473, 1996.
DOI : 10.1145/233551.233553

H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra, Executing SQL over encrypted data in the database-service-provider model, SIGMOD Conference, pp.216-227, 2002.

B. Hore, S. Mehrotra, and G. Tsudik, A Privacy-Preserving Index for Range Queries, (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, pp.720-731, 2004.
DOI : 10.1016/B978-012088469-8.50064-4

M. S. Islam, M. Kuzu, and M. Kantarcioglu, Access pattern disclosure on searchable encryption: Ramification, attack and mitigation, NDSS, 2012.

M. S. Islam, M. Kuzu, and M. Kantarcioglu, Inference attack against encrypted range queries on outsourced databases, Proceedings of the 4th ACM conference on Data and application security and privacy, CODASPY '14, pp.235-246, 2014.
DOI : 10.1145/2557547.2557561

S. Jarecki, C. S. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, Outsourced symmetric private information retrieval, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.875-888, 2013.
DOI : 10.1145/2508859.2516730

E. Kushilevitz and R. Ostrovsky, Replication is not needed: single database, computationally-private information retrieval, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.364-373, 1997.
DOI : 10.1109/SFCS.1997.646125

J. Li and E. Omiecinski, Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases, Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security Proceedings, pp.69-83, 2005.
DOI : 10.1145/285237.285282

R. Ostrovsky and W. Skeith, A Survey of Single-Database Private Information Retrieval: Techniques and Applications, Public Key Cryptography, pp.393-411, 2007.
DOI : 10.1007/978-3-540-71677-8_26

P. Samarati, S. De-capitani, and D. Vimercati, Data protection in outsourcing scenarios, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.1-14, 2010.
DOI : 10.1145/1755688.1755690

E. Shi, J. Bethencourt, H. T. Chan, D. X. Song, and A. Perrig, Multi-Dimensional Range Query over Encrypted Data, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.20-23, 2007.
DOI : 10.1109/SP.2007.29

E. Stefanov, M. Van-dijk, E. Shi, C. W. Fletcher, L. Ren et al., Path ORAM, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.299-310, 2013.
DOI : 10.1145/2508859.2516660

URL : http://dspace.mit.edu/bitstream/1721.1/86163/1/Devadas_Path%20ORAM.pdf

S. Wang, X. Ding, R. H. Deng, and F. Bao, Private Information Retrieval Using Trusted Hardware, ESORICS, pp.49-64, 2006.
DOI : 10.1007/11863908_4

A. C. Yao, How to generate and exchange secrets (extended abstract), FOCS, pp.162-167, 1986.