Public Key Encryption with Keyword Search, EUROCRYPT, pp.506-522, 2004. ,
DOI : 10.1007/978-3-540-24676-3_30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.1462
Private information retrieval by keywords, IACR Cryptology ePrint Archive, 1998. ,
Private information retrieval, Journal of the ACM, vol.45, issue.6, pp.965-981, 1998. ,
DOI : 10.1145/293347.293350
Practical and Privacy-Preserving Policy Compliance for Outsourced Data, WAHC, 2014. ,
DOI : 10.1007/978-3-662-44774-1_15
Universal service-providers for private information retrieval, J. Cryptology, vol.14, issue.1, pp.37-74, 2001. ,
On minimizing the size of encrypted databases, DBSec, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01284872
Keyword Search and Oblivious Pseudorandom Functions, TCC, pp.303-324, 2005. ,
DOI : 10.1007/978-3-540-30576-7_17
How to construct random functions, Journal of the ACM, vol.33, issue.4, pp.792-807, 1986. ,
DOI : 10.1145/6490.6503
How to play any mental game or a completeness theorem for protocols with honest majority, STOC, pp.218-229, 1987. ,
Software protection and simulation on oblivious RAMs, Journal of the ACM, vol.43, issue.3, pp.431-473, 1996. ,
DOI : 10.1145/233551.233553
Executing SQL over encrypted data in the database-service-provider model, SIGMOD Conference, pp.216-227, 2002. ,
Access pattern disclosure on searchable encryption: Ramification, attack and mitigation, NDSS, 2012. ,
Outsourced symmetric private information retrieval, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.875-888, 2013. ,
DOI : 10.1145/2508859.2516730
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection, TCC, pp.577-594, 2009. ,
DOI : 10.1007/978-3-642-00457-5_34
Replication is not needed: single database, computationally-private information retrieval, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.364-373, 1997. ,
DOI : 10.1109/SFCS.1997.646125
A Survey of Single-Database Private Information Retrieval: Techniques and Applications, Public Key Cryptography, pp.393-411, 2007. ,
DOI : 10.1007/978-3-540-71677-8_26
Practical techniques for searches on encrypted data, IEEE Symposium on Security and Privacy, pp.44-55, 2000. ,
Private Information Retrieval Using Trusted Hardware, ESORICS, pp.49-64, 2006. ,
DOI : 10.1007/11863908_4