نتایج جستجو برای: order preserving encryption
تعداد نتایج: 975584 فیلتر نتایج به سال:
Privacy preserving data mining (PPDM) deals with protecting the privacy of individual data or sensitive knowledge without sacrificing the utility of the data. To protect corporate privacy, the data owner will perform Rob Frugal encryption scheme and transforms it to the server. Data owner will send the mining queries to the server and recovers true patterns from the extracted patterns received ...
Encryption algorithms used in privacy preserving protocols can be affected on overall performance. In this paper we study several encryption algorithms with two methods of privacy preserving association rule mining on distributed horizontal database (PPARM4, and PPARM3). The first method PPARM4 computes association rules that hold globally while limiting the information shared about each site i...
We further the study of order-preserving symmetric encryption (OPE), a primitive for allowing efficient range queries on encrypted data, recently initiated (from a cryptographic perspective) by Boldyreva et al. (Eurocrypt ’09). First, we address the open problem of characterizing what encryption via a random order-preserving function (ROPF) leaks about underlying data (ROPF being the “ideal obj...
Cloud computing is basically virtual pool of resources and it provides these resources to its users via internet as services who use them as when needed basis. On demands of user’s data confidentiality and privacy the data is stored in cloud server as encrypted. Ideally, to maintain the security of user’s data queries should be processing over encrypted data. There are different schemes recomme...
This note describes a theoretical chosen-plaintext attack on the VAES3 mode for format-preserving encryption. VAES3 was specified under the name FF2 in Draft NIST Special Publication 800-38G.
In this paper we propose a method which will preserve summary statistics of data organized in a two way table. We have shown that fully homomorphic encryption is a powerful solution. However it has a number of disadvantages which makes it impractical. We have proposed a Restricted homomorphic encryption method which uses Pailier encryption and order preserving encryption. This new method can be...
Recent databases are implemented as in-memory columnstores. Adjustable encryption offers a solution to encrypted database processing in the cloud. We show that the two technologies play well together by providing an analysis and prototype results that demonstrate the impact of mechanisms at the database side (dictionaries and their compression) and cryptographic mechanisms at the adjustable enc...
Statistical analysis of ciphertexts has been recently used to carry out devastating inference attacks on deterministic encryption (Naveed, Kamara, and Wright, CCS 2015), order-preserving/revealing encryption (Grubbs et al., S&P 2017), and searchable encryption (Pouliot and Wright, CCS 2016). At the heart of these inference attacks is classical frequency analysis. In this paper, we propose and e...
This paper aims at secure and privacy-preserving consensus algorithms of networked systems. Due to the technical challenges behind decentralized design such algorithms, existing results are mainly restricted a network systems with simplest first-order dynamics. Like many other control problems, breakthrough gap between dynamics higher-order ones demands for more advanced developments. In this p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید