Structured Encryption and Controlled Disclosure, Proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security, pp.577-594, 2010. ,
DOI : 10.1007/978-3-642-17373-8_33
URL : https://eprint.iacr.org/2011/010.pdf
Searchable symmetric encryption, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.79-88, 2006. ,
DOI : 10.1145/1180405.1180417
Boolean symmetric searchable encryption, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.265-276, 2013. ,
DOI : 10.1145/2484313.2484347
URL : https://hal.archives-ouvertes.fr/hal-00952541
Highlyscalable searchable symmetric encryption with support for Boolean queries, Proceedings of Advances in Cryptology -CRYPTO 2013 -33rd Annual Cryptology Conference, pp.353-373, 2013. ,
DOI : 10.1007/978-3-642-40041-4_20
URL : http://eprint.iacr.org/2013/169.pdf
Path ORAM, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.299-310, 2013. ,
DOI : 10.1145/2508859.2516660
URL : http://dspace.mit.edu/bitstream/1721.1/86163/1/Devadas_Path%20ORAM.pdf
Multi-keyword Similarity Search over Encrypted Cloud Data, Proceedings of 29th IFIP TC 11 International Conference, pp.52-65, 2014. ,
DOI : 10.1007/978-3-642-55415-5_5
URL : https://hal.archives-ouvertes.fr/hal-01370353
Efficient Robust Private Set Intersection, International Journal of Applied Cryptography, vol.22, issue.11, pp.289-303, 2012. ,
DOI : 10.1109/SFCS.1982.38
Scaling Private Set Intersection to Billion-Element Sets, Proceedings of the 18th International Conference of Financial Cryptography and Data Security, pp.195-215, 2014. ,
DOI : 10.1007/978-3-662-45472-5_13
Secure multi-party computation. Manuscript. Preliminary version, 1998. ,
Information sharing across private databases, Proceedings of the 2003 ACM SIGMOD international conference on on Management of data , SIGMOD '03, pp.86-97, 2003. ,
DOI : 10.1145/872757.872771
URL : http://www.cs.cornell.edu/aevf/research/SIGMOD_2003.pdf
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information, Proceedings of the 4th International Conference on Trust and Trustworthy Computing, pp.239-253, 2011. ,
DOI : 10.1007/978-3-642-14527-8_5
The University of Michigan Honest Broker: A Web-based Service for Clinical and Translational Research and Practice, Journal of the American Medical Informatics Association, pp.16-784, 2009. ,
DOI : 10.1197/jamia.M2985
A multidisciplinary approach to honest broker services for tissue banks and clinical data, Cancer, vol.7, issue.pt 1, pp.1705-1715, 2008. ,
DOI : 10.1002/cncr.23768
A proposed architecture for trusted third party services, Proceedings of the International Conference on Cryptography: Policy and Algorithms, pp.98-104, 1995. ,
DOI : 10.1007/BFb0032349
A trusted third-party computation service, 2001. ,
A Privacy Preserving Repository for Data Integration across Data Sharing Services, IEEE Transactions on Services Computing, vol.1, issue.3, pp.130-140, 2008. ,
DOI : 10.1109/TSC.2008.14
Toward private joins on outsourced data. Knowledge and Data Engineering, IEEE Transactions on, vol.24, pp.1699-1710, 2012. ,
DOI : 10.1109/tkde.2011.142
URL : http://www.carbunar.com/privatejoins_tkde.pdf
Two-party computation model for privacypreserving queries over distributed databases, Proceedings of the 2009 Network and Distributed System Security Symposium, 2009. ,
Secure distributed computation of anonymized views of shared databases, ACM Transactions on Database Systems, vol.37, issue.2, p.11, 2012. ,
DOI : 10.1145/2188349.2188353
A public key cryptosystem and a signature scheme based on discrete logarithms, Proceedings of Advances in Cryptology -CRYPTO 1984 -14th Annual Cryptology Conference, pp.10-18, 1984. ,
Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866109-5