搜索结果: 1-15 共查到“军队指挥学 Symmetric encryption”相关记录40条 . 查询时间(0.091 秒)
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy
Dynamic Searchable Symmetric Encryption Forward Privacy Backward Privacy
2019/9/19
Dynamic Searchable Symmetric Encryption (DSSE) enables a client to perform updates and searches on encrypted data which makes it very useful in practice. To protect DSSE from the leakage of updates (l...
Forward and Backward-Secure Range-Searchable Symmetric Encryption
dynamic symmetric searchable encryption range query forward security
2019/5/21
Dynamic searchable symmetric encryption (DSSE) allows a client to search or update over an outsourced encrypted database. Range query is commonly needed (AsiaCrypt'18) but order-preserving encryption ...
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations
Filter Permutator FLIP Homomorphic Encryption
2019/5/14
Motivated by the application of delegating computation, we revisit the design of filter permutators as a general approach to build stream ciphers that can be efficiently evaluated in a fully homomorph...
Tight Time-Memory Trade-offs for Symmetric Encryption
provable security time-memory trade-offs
2019/3/6
Concrete security proofs give upper bounds on the attacker's advantage as a function of its time/query complexity. Cryptanalysis suggests however that other resource limitations - most notably, the at...
Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes
secret-key cryptography FHE
2018/7/9
Optimizing performance of Fully Homomorphic Encryption (FHE) is nowadays an active trend of research in cryptography. One way of improvement is to use a hybrid construction with a classical symmetric ...
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security
Dynamic searchable symmetric encryption forward security backward security
2018/6/27
Dynamic searchable symmetric encryption (DSSE) is a useful cryptographic tool in the encrypted cloud storage. However, it has been reported that DSSE usually suffers from the file-injection attacks an...
BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage
Searchable Symmetric Encryption Trusted Hardware Cloud Computing
2018/6/13
The prevalence and availability of cloud infrastructures has made them the de facto solution for storing and archiving data, both for organizations and individual users. Nonetheless, the cloud's wide ...
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
searchable encryption symmetric primitives forward privacy
2018/5/28
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions ...
A searchable symmetric encryption (SSE) scheme enables a client to store data on an untrusted server while supporting keyword searches in a secure manner. Recent experiments have indicated that the pr...
Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search
Privacy-enhancing technologies dynamic searchable symmetric encryption
2017/12/25
Dynamic Searchable Symmetric Encryption (DSSE) allows to delegate keyword search and file update over an encrypted database via encrypted indexes, and therefore provides opportunities to mitigate the ...
Block Chain based Searchable Symmetric Encryption
Searchable Symmetric Encryption Block-Chain Cloud-Computing
2017/5/25
The mechanism for traditional Searchable Symmetric Encryption is pay-then-use. That is to say, if a user wants to search some documents that contain special keywords, he needs to pay to the server fir...
Multi-level Access in Searchable Symmetric Encryption
searchable encryption access control searchable symmetric encryption
2017/3/1
Remote storage delivers a cost effective solution for data storage. If data is of a sensitive nature, it should be encrypted prior to outsourcing to ensure confidentiality; however, searching then bec...
Storage Efficient Substring Searchable Symmetric Encryption
searchable encryption substring queries
2017/2/23
We address the problem of substring searchable encryption. A single user produces a big stream of data and later on wants to learn the positions in the string that some patterns occur. Although curren...
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity
searchable encryption structured encryption sub-linear boolean search
2017/2/20
Recent work on searchable symmetric encryption (SSE) has focused on increasing its expressiveness. A notable example is the OXT construction (Cash et al., CRYPTO '13 ) which is the first SSE scheme to...
Attacks to a proxy-mediated key agreement protocol based on symmetric encryption
key agreement proxy re-encryption
2016/12/7
In this paper, we describe several attacks to the protocol by Nguyen et al. presented at ESORICS 2016, an authenticated key agreement protocol mediated by a proxy entity, restricted to only symmetric ...