نتایج جستجو برای: private key search

تعداد نتایج: 913761  

Journal: :CoRR 2018
Zhen Chen Zhiying Wang Syed Jafar

The private search problem is introduced, where a dataset comprised of L i.i.d. records is replicated across N non-colluding servers, each record takes values uniformly from an alphabet of size K, and a user wishes to search for all records that match a privately chosen value, without revealing any information about the chosen value to any individual server. The capacity of private search is th...

Journal: :IACR Cryptology ePrint Archive 2016
Xavier Carpent Sky Faber Tomas Sander Gene Tsudik

There are many realistic settings where two mutually suspicious parties need to share some specific information while keeping everything else private. Various privacy-preserving techniques (such as Private Set Intersection) have been proposed as general solutions. Based on timely real-world examples, this paper motivates the need for a new privacy tool, called Private Set Intersection with Proj...

Journal: :IACR Cryptology ePrint Archive 2001
Mihir Bellare Bennet S. Yee

This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area. We identify forward-secure pseudorandom bit generators as the central pri...

Governance in health is cited as one of the key factors in balancing the concerns of the government and public sector with the interests of civil society/private players, but often remains poorly described and operationalized. Richard Saltman and Antonio Duran look at two aspects in the search for new provider models in a context of health markets signalling liberalisation: (i) the role of the ...

Journal: :Human-centric Computing and Information Sciences 2012

Journal: :Proceedings on Privacy Enhancing Technologies 2022

The unavailability of training data is a permanent source much frustration in research, especially when it due to privacy concerns. This particularly true for location since previous techniques all suffer from the inherent sparseness and high dimensionality trajectories which render most impractical, resulting unrealistic traces non-scalable methods. Moreover, time information visits usually dr...

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید