References
- M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, 'Encryption with keyword search, revisited: consistency conditions, relations to anonymous IBE, and extensions' In Proceedings of Crypto'05, LNCS Vol. 3621, pp. 205-222, Springer-Verlag, 2005
- B. Bloom, 'Space/time trade-offs in hash coding with allowable errors', Communications of the ACM, 13(7):422-426, 1970 https://doi.org/10.1145/362686.362692
- D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, 'Public Key Encryption with Keyword Search', In Proceedings of Eurocrypt'04, LNCS Vol. 3089, pp. 31-45, Springer-Verlag, 2004
- D. Boneh and M. Franklin, 'Identity-Based Encryption from the Weil Pairing', SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003 https://doi.org/10.1137/S0097539701398521
- J. W. Byun, D. H. Lee, and J. Lim, 'Efficient Conjuctive Keyword Search on Encrypted Data Storage System', In Proceedings of EuroPKI'06, LNCS Vol. 4043, pp. 184-196, 2006
- D. Boneh and B. Waters, 'Conjunctive, Subset, and Range Queries on Encrypted Data', In Proceedings of TCC'07, LNCS Vol. 4392, pp. 535-554, 2007 https://doi.org/10.1007/978-3-540-70936-7_29
- B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, 'Private Information Retrieval', In Proceedings of 29th STOC, 1997
- G. Di. Crescenzo, Y. Ishai, and R. Ostrovsky, 'Universal Service-providers for Database Private Information Retrieval', In Proceedings of 17th PODC, 1998 https://doi.org/10.1007/s001450010008
- G. Di. Crescenzo, T. Malkin, and R. Ostrovsky, 'Single-database private information retrieval implies oblivious transfer', In Proceedings of Eurocrypt'00, LNCS Vol. 1807, pp. 122-139, Springer-Verlag, 2000 https://doi.org/10.1007/3-540-45539-6_10
- C. Cachin, S. Micali, and M. Stadler, 'Computationally Private Information Retrieval', In Proceedings of Eurocrypt'99, LNCS Vol. 1403, pp. 361-374, 1998
- Y. Chang and M. Mitzenmacher, 'Privacy preserving keyword searches on remote encrypted data”' In Proceedings of ACNS`05, LNCS Vol. 3531, pp. 442-445, Springer-Verlag, 2005 https://doi.org/10.1007/11496137_30
- P. Golle, J. Staddon, and B. Waters, 'Secure Conjunctive Keyword Search Over Encrypted Data', In Proceedings of ACNS'04, LNCS Vol. 3089, pp. 31-45, Springer-Verlag, 2004 https://doi.org/10.1007/978-3-540-24852-1_3
- S. Goldwasser and M. Bellare, Lecture notes on cryptography', page 155, 2001. Available at http://www-cse.ucsd.edu/users/mihir/courses.html
- E. Goh, 'Secure Indexes', In Cryptology ePrint Archieve on March 16, 2004, Availabe at http://eprint.iacr.org/2003/216
- A. Gordon, M. P. Loeb, W. Lucyshyn, and R. Richardson, '2004 CSI/FBI Computer Crime and Security Survey', Ninth annual report of computer security society, CSI, 2004. For general information, refer to 'http://gocsi.com or http://www.nipc.gov
- Microsoft Developer Network (MSDN), in the part of Maximum Capacity Specifications for SQL Server 2005. Refer to http://msdn2.microsoft.com/en us/library/ms143432(SQL.90).aspx
- M. Naor and M. Yung. 'Universal One-way Hash Functions and Their Cryptographic Applications', In Proceedings of the 21st ACM Symposium on Theory of Computing, pp 33-43, ACM Press, 1989
- R. Ostrovsky and W. Skeith, 'Private keyword search on streaming data', This paper is availabe at http://eprint.iacr.org/2005/242
- W. Ogata and K. Kurosawa, 'Oblivious keyword search' Journal of Complexity, Vol. 20, Issues 2-3, pp. 356-371, 2004 https://doi.org/10.1016/j.jco.2003.08.023
- D. J. Park, K. Kim, and P. J. Lee, 'Public Key Encryption with Conjunctive Field Keyword Search', In Proceedings of WISA'04, LNCS Vol. 3325, pp. 73-86, Springer-Verlag, 2004 https://doi.org/10.1007/978-3-540-31815-6_7
- V.Shoup, 'Sequences of games: a tool for taming complexity in security proofs', Cryptology ePrint Archive, Report 2004/332, 2004
- M. Scott and P. S. L. M. Barreto, 'Compressed pairing', In Proceedings of Crypto'04, LNCS Vol. 3152, pp. 140-156, Springer-Verlag, 2004 https://doi.org/10.1007/978-3-540-28628-8_9
- D. Song, D. Wagner, and A. Perrig, 'Practical Techniques for Searches on Encrypted Data', In Proceedings of IEEE sysmposium on Security and Privacy, 2000
- V. D. R. Safavi-Naini, and, F. Zhang, 'New traitor tracing schemes using bilinear map', In 2003 ACM Workshop on Digital Rights Management (DRM 2003), 2003