نتایج جستجو برای: order preserving encryption

تعداد نتایج: 975584  

Journal: :Proceedings on Privacy Enhancing Technologies 2022

We present ARQ, a systematic framework for creating cryptographic schemes that handle range aggregate queries (sum, minimum, median, and mode) over encrypted datasets. Our does not rely on trusted hardware or specialized primitives such as property-preserving homomorphic encryption. Instead, ARQ unifies structures from the plaintext data management community with existing structured encryption ...

Journal: :J. Inf. Sci. Eng. 2014
Yang Lu Jiguo Li

Certificate-based encryption is a useful primitive that combines traditional public key encryption and identity-based encryption while preserving some of their most attractive features. It not only simplifies the cumbersome certificate management in traditional PKI, but also solves the key escrow problem inherent in identity-based encryption. In this paper, we propose a new certificate-based en...

2012
Jin Shi

Asymptotic preserving (AP) schemes for multiscale kinetic and hyperbolic equations: a review Abstract. Kinetic and hyperbolic equations contain small scales (mean free path/time, Debye length, relaxation or reaction time, etc.) that lead to various different asymptotic regimes, in which the classical numerical approximations become prohibitively expensive. Asymptotic-preserving (AP) schemes are...

Journal: :Big data and cognitive computing 2022

In recent decades, big data analysis has become the most important research topic. Hence, security offers Cloud application and monitoring to host highly sensitive support platforms. However, privacy of an emerging issue that restricts organization utilize services. The existing preserving approaches showed several drawbacks such as a lack accurate analysis, efficiency performance, completely r...

2010
SHI JIN

Kinetic and hyperbolic equations contain small scales (mean free path/time, Debye length, relaxation or reaction time, etc.) that lead to various different asymptotic regimes, in which the classical numerical approximations become prohibitively expensive. Asymptotic-preserving (AP) schemes are schemes that are efficient in these asymptotic regimes. The designing principle of AP schemes are to p...

Journal: :IACR Cryptology ePrint Archive 2016
Mehmet Sabir Kiraz

Existing cloud storage systems receive the data in its plain form and perform conventional (server-side) deduplication mechanisms. However, disclosing the data to the cloud can potentially threaten the security and privacy of users, which is of utmost importance for a real-world cloud storage. This can be solved by secure deduplication mechanisms which enables the user to encrypt the data on th...

Journal: :CoRR 2017
Florian Kerschbaum Anselme Tueno

At CCS 2015 Naveed et al. presented first attacks on efficiently searchable encryption, such as deterministic and order-preserving encryption. These plaintext guessing attacks have been further improved in subsequent work, e.g. by Grubbs et al. in 2016. Such cryptanalysis is crucially important to sharpen our understanding of the implications of security models. In this paper we present an effi...

2016
Timo Schindler Christoph Skornia

With the increase of centralization of resources in IT-infrastructure and the growing amount of cloud services, database management systems (DBMS) will be more and more outsourced to Infrastructure-as-a-Service (IaaS) providers. The outsourcing of entire databases, or the computation power for processing Big Data to an external provider also means that the provider has full access to the inform...

Journal: :Bulletin of the Australian Mathematical Society 2000

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید