Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage

نویسندگان

  • Peng Xu
  • Shuai Liang
  • Wei Wang
  • Willy Susilo
  • Qianhong Wu
  • Hai Jin
چکیده

08:30 – 09:30 Powhiri welcome Registration 08:00 – 17:10 09:30 – 10:30 Jennifer Seberry Lecture: Prof. Clark Thomborson 10:30 – 10:50 Coffee break 11:50 – 12:30 Regular papers – Session 1A + 1B 12:30 – 13:20 Lunch 13:20 – 14:00 Invited Talk 1: A/Prof Henry B Wolfe 14:00 – 15:15 Regular papers – Session 2A + 2B 15:15 – 15:40 Coffee break 15:40 – 16:30 Regular papers Session 3A+ 3B 16:30 – 17:00 Short papers – Session 1A + 1B 17:00 – 17:30 Steering Committee meeting 17:30 Welcome reception

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic Similarity Search over Encrypted Data with Low Leakage

Though cloud databases offer advantages in terms of maintenance cost, they require encryption in order to protect confidential records. Specialized searchable encryption schemes are needed to provide the functionality of privacy preserving search on encrypted data. In many use cases, a search which also returns the correct documents when the search term was misspelled is very desirable. Therefo...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

Practical Dynamic Searchable Encryption with Small Leakage

Dynamic Searchable Symmetric Encryption (DSSE) enables a client to encrypt his document collection in a way that it is still searchable and efficiently updatable. However, all DSSE constructions that have been presented in the literature so far come with several problems: Either they leak a significant amount of information (e.g., hashes of the keywords contained in the updated document) or are...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

The Fallacy of Composition of Oblivious RAM and Searchable Encryption

Oblivious RAM (ORAM) is a tool proposed to hide access pattern leakage, and there has been a lot of progress in the efficiency of ORAM schemes; however, less attention has been paid to study the applicability of ORAM for cloud applications such as symmetric searchable encryption (SSE). Although, searchable encryption is one of the motivations for ORAM research, no in-depth study of the applicab...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017