نتایج جستجو برای: order preserving encryption

تعداد نتایج: 975584  

2010
Eric Brier Thomas Peyrin Jacques Stern

In recent months, attacks on servers of payment processors have led to the disclosure of tens of millions of credit card numbers (also known as Personal Account Numbers, PANs). As an answer, end-to-end encryption has been advocated and an encryption standard that preserves the format of the data would be welcome. More generally, a format-preserving encryption scheme would be welcomed for many r...

Journal: :Security and Communication Networks 2012
Kwangsu Lee Intae Kim Seong Oun Hwang

Predicate encryption (PE) that provides both the access control of ciphertexts and the privacy of ciphertexts is a new paradigm of public-key encryption. An important application of PE is a searchable encryption system in cloud storage, where it enables a client to securely outsource the search of a keyword on encrypted data without revealing the keyword to the cloud server. One practical issue...

2015
B. Brinda Devi

Bucketization is the splitting of large amount of data into smaller chunks and storing the parts in different sub servers called buckets. This paper deals with ordered bucketization (OB), which makes use of a random key generator algorithm and a deterministic bucketing algorithm, to propose a secure storage and retrieval system for multimedia files. In OB, plaintext-space is split into a number...

2004
Yuval Elovici Ronen Vaisenberg Erez Shmueli Ehud Gudes

A new simple and efficient database encryption scheme is presented. The new scheme enables encrypting the entire content of the database without changing its structure. In addition, the scheme suggests how to convert the conventional database index to a secure index on the encrypted database so that the time complexity of all queries is maintained. No one with access to the encrypted database c...

2017
F. Betül Durak Serge Vaudenay

The NIST standard FF3 scheme (also known as BPS scheme) is a tweakable block cipher based on a 8-round Feistel Network. We break it with a practical attack. Our attack exploits the bad domain separation in FF3 design. The attack works with chosen plaintexts and tweaks when the message domain is small. Our FF3 attack requires O(N 11 6 ) chosen plaintexts with time complexity N, where N is domain...

Journal: :IACR Cryptology ePrint Archive 2015
Payal Chaudhari Manik Lal Das

Attribute Based Encryption (ABE) is a promising public-key cryptographic primitive that can be used for cryptographically enforced access control in untrusted storage. Storing data on untrusted storage not only requires data security for data owners but also poses data protection from untrusted storage server. To address this important requirement, Anonymous Attribute Based Encryption (AABE) is...

2012
Zeen Kim Jangseong Kim Doyoung Chung Kwangjo Kim Taeshik Shon

In this paper, we provide the first scalable privacy-preserving authentication protocol for VANETs without participation of the nearby RSU. Existing authentication methods for VANETs require the participation of the nearby RSUs. So, bottleneck problem can be occurred as increasing the number of vehicles. Also, the time delay to authenticate the nearby vehicle will increase. In order to minimize...

2009
Wenjun Lu Ashwin Swaminathan Avinash L. Varna Min Wu

Performing information retrieval tasks while preserving data confidentiality is a desirable capability when a database is stored on a server maintained by a third-party service provider. This paper addresses the problem of enabling content-based retrieval over encrypted multimedia databases. Search indexes, along with multimedia documents, are first encrypted by the content owner and then store...

2018
Florian Hahn Nicolas Loza Florian Kerschbaum

In this paper we address the problem of outsourcing sensitive strings while still providing the functionality of substring searches. While security is one important aspect that requires careful system design, the practical application of the solution depends on feasible processing time and integration efforts into existing systems. That is, searchable symmetric encryption (SSE) allows queries o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید