نتایج جستجو برای: order preserving encryption

تعداد نتایج: 975584  

2014
R.GANGA T.BALACHANDER

Privacy preserving data mining (PPDM) deals with protecting the privacy of individual data or sensitive knowledge without sacrificing the utility of the data. To protect corporate privacy, the data owner will perform Rob Frugal encryption scheme and transforms it to the server. Data owner will send the mining queries to the server and recovers true patterns from the extracted patterns received ...

Journal: :I. J. Network Security 2012
Ashraf El-Sisi Hamdy M. Mousa

Encryption algorithms used in privacy preserving protocols can be affected on overall performance. In this paper we study several encryption algorithms with two methods of privacy preserving association rule mining on distributed horizontal database (PPARM4, and PPARM3). The first method PPARM4 computes association rules that hold globally while limiting the information shared about each site i...

2011
Alexandra Boldyreva Nathan Chenette Adam O'Neill

We further the study of order-preserving symmetric encryption (OPE), a primitive for allowing efficient range queries on encrypted data, recently initiated (from a cryptographic perspective) by Boldyreva et al. (Eurocrypt ’09). First, we address the open problem of characterizing what encryption via a random order-preserving function (ROPF) leaks about underlying data (ROPF being the “ideal obj...

2015
Nasrin Dalil Ahmed Kayed

Cloud computing is basically virtual pool of resources and it provides these resources to its users via internet as services who use them as when needed basis. On demands of user’s data confidentiality and privacy the data is stored in cloud server as encrypted. Ideally, to maintain the security of user’s data queries should be processing over encrypted data. There are different schemes recomme...

Journal: :IACR Cryptology ePrint Archive 2015
Morris Dworkin Ray A. Perlner

This note describes a theoretical chosen-plaintext attack on the VAES3 mode for format-preserving encryption. VAES3 was specified under the name FF2 in Draft NIST Special Publication 800-38G.

Journal: :IACR Cryptology ePrint Archive 2013
Sanchita Barman Bimal Roy

In this paper we propose a method which will preserve summary statistics of data organized in a two way table. We have shown that fully homomorphic encryption is a powerful solution. However it has a number of disadvantages which makes it impractical. We have proposed a Restricted homomorphic encryption method which uses Pailier encryption and order preserving encryption. This new method can be...

2013
Florian Kerschbaum Martin Härterich Axel Schröpfer Patrick Grofig Mathias Kohler Walter Tighzert Isabelle Hang Andreas Schaad

Recent databases are implemented as in-memory columnstores. Adjustable encryption offers a solution to encrypted database processing in the cloud. We show that the two technologies play well together by providing an analysis and prototype results that demonstrate the impact of mechanisms at the database side (dictionaries and their compression) and cryptographic mechanisms at the adjustable enc...

2018
Marie-Sarah Lacharité Kenneth G. Paterson

Statistical analysis of ciphertexts has been recently used to carry out devastating inference attacks on deterministic encryption (Naveed, Kamara, and Wright, CCS 2015), order-preserving/revealing encryption (Grubbs et al., S&P 2017), and searchable encryption (Pouliot and Wright, CCS 2016). At the heart of these inference attacks is classical frequency analysis. In this paper, we propose and e...

Journal: :Systems & Control Letters 2021

This paper aims at secure and privacy-preserving consensus algorithms of networked systems. Due to the technical challenges behind decentralized design such algorithms, existing results are mainly restricted a network systems with simplest first-order dynamics. Like many other control problems, breakthrough gap between dynamics higher-order ones demands for more advanced developments. In this p...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید