نتایج جستجو برای: order preserving encryption
تعداد نتایج: 975584 فیلتر نتایج به سال:
In this talk, we provide a generic transformation from any affine message authentication code (MAC) to an identity-based encryption (IBE) scheme over pairing groups of prime order. If the MAC satisfies a security notion related to unforgeability against chosen-message attacks and, for example, the k-Linear assumption holds, then the resulting IBE scheme is adaptively secure. Our security reduct...
With the advent of cloud computing, individuals and organizations have become interested in moving their databases from local to remote cloud servers. However, data owners and cloud service providers are not in the same trusted domain in practice. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective database utilization a very...
Deciding “greater-than” relations among data items just given their encryptions is at the heart of search algorithms on encrypted data, most notably, non-interactive binary search on encrypted data. Order-preserving encryption provides one solution, but provably provides only limited security guarantees. Two-input functional encryption is another approach, but requires the full power of obfusca...
In this paper we analyze whether regional economic integration across US states conditions local labor-market adjustment. We examine the mechanisms through which states absorb changes in labor supplies and whether industry production techniques are similar across states. There are two main findings. Firstly, states absorb changes in employment primarily through changes in production techniques ...
A new theoretical approximation for expectation of the prediction error is derived using the same-realization predictions. This approximation is derived for the case that the Least-Squares-Forward (LSF) method (the covariance method) is used for estimating the parameters of the autoregressive (AR) model. This result is used for obtaining modified versions of the AR order selection criteria FPE ...
In 2003 Kenya abolished user fees in all government primary schools. We find that this Free Primary Education (FPE) policy resulted in a decline in public school quality and increased demand for private schooling. However, the former did not reflect a decline in value added by public schools as anticipated if fees contribute to local accountability but rather the selection of weaker pupils into...
Medical data is frequently quite sensitive in terms of privacy and security. Federated learning has been used to increase the security medical data, which a sort machine technique. The training disseminated across numerous machines federated learning, process collaborative. There are attacks on deep (DL) models that attackers can use obtain information. As result, DL model should be safeguarded...
Homomorphic encryption (HE) schemes, such as fully homomorphic (FHE), support a number of useful computations on ciphertext in broad range applications, e-voting, private information retrieval, cloud security, and privacy protection. While FHE schemes do not require any interaction during computation, the key limitations are large expansion inefficiency. Thus, to overcome these limitations, we ...
Privacy-preserving deep learning with homomorphic encryption (HE) is a novel and promising research area aimed at designing solutions that operate while guaranteeing the privacy of user data. Designing privacy-preserving requires one to completely rethink redesign models algorithms match severe technological algorithmic constraints HE. This paper provides an introduction this complex as well me...
This Recommendation specifies three methods for format-preserving encryption, called FF1, FF2, and FF3. Each of these methods is a mode of operation of the AES algorithm, which is used to construct a round function within the Feistel structure for encryption.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید