Searchable symmetric encryption: improved definitions and efficient constructions

@inproceedings{Curtmola2006SearchableSE,
  title={Searchable symmetric encryption: improved definitions and efficient constructions},
  author={Reza Curtmola and Juan A. Garay and Seny Kamara and Rafail Ostrovsky},
  booktitle={ACM Conference on Computer and Communications Security},
  year={2006}
}
Searchable symmetric encryption (SSE) allows a party to outsource the storage of its data to another party (a server) in a private manner, while maintaining the ability to selectively search over it. This problem has been the focus of active research in recent years. In this paper we show two solutions to SSE that simultaneously enjoy the following properties: Both solutions are more efficient than all previous constant-round schemes. In particular, the work performed by the server per returned… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 1,134 CITATIONS, ESTIMATED 25% COVERAGE

GraphSE2: An Encrypted Graph Database for Privacy-Preserving Social Search

  • ArXiv
  • 2019
VIEW 14 EXCERPTS
CITES METHODS, BACKGROUND & RESULTS
HIGHLY INFLUENCED

Privacy-preserving efficient searchable encryption

VIEW 20 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

The performance cost of preserving data/query privacy using searchable symmetric encryption

  • Security and Communication Networks
  • 2016
VIEW 13 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Trusted Systems

  • Lecture Notes in Computer Science
  • 2015
VIEW 15 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A Survey of Provably Secure Searchable Encryption

VIEW 21 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage

  • 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)
  • 2018
VIEW 9 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

1979
2019

CITATION STATISTICS

  • 248 Highly Influenced Citations

  • Averaged 180 Citations per year over the last 3 years

References

Publications referenced by this paper.
SHOWING 1-3 OF 3 REFERENCES

Privacy Preserving Keyword Searches on Remote Encrypted Data

  • IACR Cryptology ePrint Archive
  • 2004
VIEW 14 EXCERPTS
HIGHLY INFLUENTIAL

Technical Report 2003/216

E-J. Goh. Secure indexes
  • IACR ePrint Cryptography Archive,
  • 2003
VIEW 18 EXCERPTS
HIGHLY INFLUENTIAL

Journal of Cryptology

Oded Goldreich. A uniform complexity treatment of encryption, zero-knowledge
  • 6(1):21–53,
  • 1993
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Similar Papers

Loading similar papers…