نتایج جستجو برای: order preserving encryption

تعداد نتایج: 975584  

Journal: :IACR Cryptology ePrint Archive 2014
Olivier Blazy Eike Kiltz Jiaxin Pan

In this talk, we provide a generic transformation from any affine message authentication code (MAC) to an identity-based encryption (IBE) scheme over pairing groups of prime order. If the MAC satisfies a security notion related to unforgeability against chosen-message attacks and, for example, the k-Linear assumption holds, then the resulting IBE scheme is adaptively secure. Our security reduct...

Journal: :Knowl.-Based Syst. 2015
Jin Li Zheli Liu Xiaofeng Chen Fatos Xhafa Xiao Tan Duncan S. Wong

With the advent of cloud computing, individuals and organizations have become interested in moving their databases from local to remote cloud servers. However, data owners and cloud service providers are not in the same trusted domain in practice. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective database utilization a very...

2014
Dan Boneh Kevin Lewi Mariana Raykova Amit Sahai Mark Zhandry Joe Zimmerman

Deciding “greater-than” relations among data items just given their encryptions is at the heart of search algorithms on encrypted data, most notably, non-interactive binary search on encrypted data. Order-preserving encryption provides one solution, but provably provides only limited security guarantees. Two-input functional encryption is another approach, but requires the full power of obfusca...

2000
Gordon H. Hanson Matthew J. Slaughter

In this paper we analyze whether regional economic integration across US states conditions local labor-market adjustment. We examine the mechanisms through which states absorb changes in labor supplies and whether industry production techniques are similar across states. There are two main findings. Firstly, states absorb changes in employment primarily through changes in production techniques ...

Journal: :EURASIP J. Adv. Sig. Proc. 2009
Shapoor Khorshidi Mahmood Karimi

A new theoretical approximation for expectation of the prediction error is derived using the same-realization predictions. This approximation is derived for the case that the Least-Squares-Forward (LSF) method (the covariance method) is used for estimating the parameters of the autoregressive (AR) model. This result is used for obtaining modified versions of the AR order selection criteria FPE ...

2003
Tessa Bold Mwangi Kimenyi Germano Mwabu Justin Sandefur

In 2003 Kenya abolished user fees in all government primary schools. We find that this Free Primary Education (FPE) policy resulted in a decline in public school quality and increased demand for private schooling. However, the former did not reflect a decline in value added by public schools as anticipated if fees contribute to local accountability but rather the selection of weaker pupils into...

Journal: :Cryptography 2022

Medical data is frequently quite sensitive in terms of privacy and security. Federated learning has been used to increase the security medical data, which a sort machine technique. The training disseminated across numerous machines federated learning, process collaborative. There are attacks on deep (DL) models that attackers can use obtain information. As result, DL model should be safeguarded...

Journal: :IEEE Transactions on Knowledge and Data Engineering 2022

Homomorphic encryption (HE) schemes, such as fully homomorphic (FHE), support a number of useful computations on ciphertext in broad range applications, e-voting, private information retrieval, cloud security, and privacy protection. While FHE schemes do not require any interaction during computation, the key limitations are large expansion inefficiency. Thus, to overcome these limitations, we ...

Journal: :IEEE Computational Intelligence Magazine 2022

Privacy-preserving deep learning with homomorphic encryption (HE) is a novel and promising research area aimed at designing solutions that operate while guaranteeing the privacy of user data. Designing privacy-preserving requires one to completely rethink redesign models algorithms match severe technological algorithmic constraints HE. This paper provides an introduction this complex as well me...

2013
Morris Dworkin

This Recommendation specifies three methods for format-preserving encryption, called FF1, FF2, and FF3. Each of these methods is a mode of operation of the AES algorithm, which is used to construct a round function within the Feistel structure for encryption.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید