M. Chase and S. Kamara, Structured Encryption and Controlled Disclosure, Proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security, pp.577-594, 2010.
DOI : 10.1007/978-3-642-17373-8_33

URL : https://eprint.iacr.org/2011/010.pdf

R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.79-88, 2006.
DOI : 10.1145/1180405.1180417

T. Moataz and A. Shikfa, Boolean symmetric searchable encryption, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.265-276, 2013.
DOI : 10.1145/2484313.2484347

URL : https://hal.archives-ouvertes.fr/hal-00952541

D. Cash, S. Jarecki, C. S. Jutla, H. Krawczyk, M. Rosu et al., Highlyscalable searchable symmetric encryption with support for Boolean queries, Proceedings of Advances in Cryptology -CRYPTO 2013 -33rd Annual Cryptology Conference, pp.353-373, 2013.
DOI : 10.1007/978-3-642-40041-4_20

URL : http://eprint.iacr.org/2013/169.pdf

E. Stefanov, M. Van-dijk, E. Shi, C. W. Fletcher, L. Ren et al., Path ORAM, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.299-310, 2013.
DOI : 10.1145/2508859.2516660

URL : http://dspace.mit.edu/bitstream/1721.1/86163/1/Devadas_Path%20ORAM.pdf

M. Strizhov and I. Ray, Multi-keyword Similarity Search over Encrypted Cloud Data, Proceedings of 29th IFIP TC 11 International Conference, pp.52-65, 2014.
DOI : 10.1007/978-3-642-55415-5_5

URL : https://hal.archives-ouvertes.fr/hal-01370353

D. Dachman-soled, T. Malkin, M. Raykova, and M. Yung, Efficient Robust Private Set Intersection, International Journal of Applied Cryptography, vol.22, issue.11, pp.289-303, 2012.
DOI : 10.1109/SFCS.1982.38

S. Kamara, P. Mohassel, M. Raykova, and S. S. Sadeghian, Scaling Private Set Intersection to Billion-Element Sets, Proceedings of the 18th International Conference of Financial Cryptography and Data Security, pp.195-215, 2014.
DOI : 10.1007/978-3-662-45472-5_13

O. Goldreich, Secure multi-party computation. Manuscript. Preliminary version, 1998.

R. Agrawal, A. Evfimievski, and R. Srikant, Information sharing across private databases, Proceedings of the 2003 ACM SIGMOD international conference on on Management of data , SIGMOD '03, pp.86-97, 2003.
DOI : 10.1145/872757.872771

URL : http://www.cs.cornell.edu/aevf/research/SIGMOD_2003.pdf

D. Cristofaro, E. Lu, Y. Tsudik, and G. , Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information, Proceedings of the 4th International Conference on Trust and Trustworthy Computing, pp.239-253, 2011.
DOI : 10.1007/978-3-642-14527-8_5

A. D. Boyd, P. R. Saxman, D. A. Hunscher, K. A. Smith, T. D. Morris et al., The University of Michigan Honest Broker: A Web-based Service for Clinical and Translational Research and Practice, Journal of the American Medical Informatics Association, pp.16-784, 2009.
DOI : 10.1197/jamia.M2985

R. Dhir, A. A. Patel, S. Winters, M. Bisceglia, D. Swanson et al., A multidisciplinary approach to honest broker services for tissue banks and clinical data, Cancer, vol.7, issue.pt 1, pp.1705-1715, 2008.
DOI : 10.1002/cncr.23768

N. Jefferies, C. J. Mitchell, and M. Walker, A proposed architecture for trusted third party services, Proceedings of the International Conference on Cryptography: Policy and Algorithms, pp.98-104, 1995.
DOI : 10.1007/BFb0032349

S. Ajmani, R. Morris, and B. Liskov, A trusted third-party computation service, 2001.

S. Yau and Y. Yin, A Privacy Preserving Repository for Data Integration across Data Sharing Services, IEEE Transactions on Services Computing, vol.1, issue.3, pp.130-140, 2008.
DOI : 10.1109/TSC.2008.14

B. Carbunar and R. Sion, Toward private joins on outsourced data. Knowledge and Data Engineering, IEEE Transactions on, vol.24, pp.1699-1710, 2012.
DOI : 10.1109/tkde.2011.142

URL : http://www.carbunar.com/privatejoins_tkde.pdf

S. S. Chow, J. H. Lee, and L. Subramanian, Two-party computation model for privacypreserving queries over distributed databases, Proceedings of the 2009 Network and Distributed System Security Symposium, 2009.

T. Tassa and E. Gudes, Secure distributed computation of anonymized views of shared databases, ACM Transactions on Database Systems, vol.37, issue.2, p.11, 2012.
DOI : 10.1145/2188349.2188353

T. E. Gamal, A public key cryptosystem and a signature scheme based on discrete logarithms, Proceedings of Advances in Cryptology -CRYPTO 1984 -14th Annual Cryptology Conference, pp.10-18, 1984.

N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987.
DOI : 10.1090/S0025-5718-1987-0866109-5