搜索结果: 1-8 共查到“军事学 Abuse”相关记录8条 . 查询时间(0.065 秒)
Early Detection and Analysis of Leakage Abuse Vulnerabilities
cryptanalysis efficiently searchable encryption encrypted databases
2017/11/1
In order to be useful in the real world, efficient cryptographic constructions often reveal, or ``leak,'' more information about their plaintext than one might desire. Up until now, the approach for a...
Thwarting Leakage Abuse Attacks against Searchable Encryption -- A Formal Approach and Applications to Database Padding
security definition searchable encryption leakage abuse attacks
2017/11/1
After the development of practical searchable encryption constructions, allowing for secure searches over an encrypted dataset outsourced to an untrusted server, at the expense of leaking some informa...
A Leakage-Abuse Attack Against Multi-User Searchable Encryption
searchable encryption attack cryptanalysis
2017/5/11
Searchable Encryption (SE) allows a user to upload data to the cloud and to search it in a remote fashion while preserving the privacy of both the data and the queries. Recent research results describ...
Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption
symmetric searchable encryption leakage passive attacks
2017/2/20
The problem of securely outsourcing client data with search functionality has given rise to efficient solutions called Symmetric Searchable Encryption (SSE) schemes. These schemes are provably secure ...
Order-preserving encryption and its generalization order-revealing encryption (OPE/ORE) are used in a variety of settings in practice in order to allow sorting, performing range queries, and filtering...
Schemes for secure outsourcing of client data with search capability are being increasingly marketed and deployed. In the literature, schemes for accomplishing this efficiently are called Searchable E...
Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
Key Abuse Attacks KP-ABE Broadcast Systems
2009/7/1
(KP-ABE) is a promising cryptographic primitive which enables fine-grained access control
over sensitive data. However, key abuse attacks in KP-ABE may impede
its wide application especially in copy...
A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control
A2BE Accountable Attribute-Based Encryption Abuse Free Access Control
2009/6/12
As a recently proposed public key primitive, attribute-based encryption (ABE) (including
Ciphertext-policy ABE (CP-ABE) and Key-policy ABE (KP-ABE)) is a highly promising
tool for secure fine-graine...