Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3,393 Hits in 6.4 sec

Search-and-Compute on Encrypted Data [chapter]

Jung Hee Cheon, Miran Kim, Myungsun Kim
2015 Lecture Notes in Computer Science  
Answering the above questions requires one to search and then compute over the encrypted databases in sequence.  ...  In this work, we construct a unified framework so as to efficiently and privately process queries with "search" and "compute" operations.  ...  Search-and-compute on Encrypted Data In this section, we show how to efficiently perform queries on encrypted data using the circuit primitives.  ... 
doi:10.1007/978-3-662-48051-9_11 fatcat:bqbbfkdz6fb3plyej6vurbcdb4

Achieving Fully Homomorphic Encryption in Security - A Survey
English

Aditi Soral
2016 International Journal of Computer Science and Engineering  
The ability to process encrypted data led to a renewed interest in Homomorphisms and a new cryptographic primitive, Fully Homomorphic Encryption (FHE) emerged.  ...  This paper provides a brief survey focusing on the development of HE to FHE and discussing all relevant research works in this direction in one section.  ...  to search the data.  ... 
doi:10.14445/23488387/ijcse-v3i2p104 fatcat:wffou6y5c5f3bdqc3rwhjzkyom

Arx

Rishabh Poddar, Tobias Boelter, Raluca Ada Popa
2019 Proceedings of the VLDB Endowment  
However, many practical proposals rely on a set of weak encryption schemes that have been shown to leak sensitive data.  ...  In recent years, encrypted databases have emerged as a promising direction that provides data confidentiality without sacrificing functionality: queries are executed on encrypted data.  ...  This research was supported by NSF CISE Expeditions #CCF-1730628, and gifts from the Sloan Foundation, Hellman Fellows Fund, Bakar Fund, Alibaba, Amazon, Ant Financial, Arm, Capital One, Ericsson, Facebook  ... 
doi:10.14778/3342263.3342641 fatcat:7rqpyv6n2rglth2h6wruknr4mu

Integrating Encrypted Cloud Database Services using Query Processing

Jadhav Sonali, B. M.
2016 International Journal of Computer Applications  
For that reason in this work proposed a new novel architecture SecureDBaaS which provides confidentiality and as well as allows concurrent execution of operations on encrypted data with distributed policy  ...  In the cloud computing, original plain data must be accessible only by trusted parties that do not include internet and cloud providers or intermediaries.  ...  schemei.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. so solution comes in three steps.  ... 
doi:10.5120/ijca2016911323 fatcat:3oy525qtg5gjbk5uihxlabgwri

Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing

2020 KSII Transactions on Internet and Information Systems  
In this paper, we propose a data outsourcing scheme based on an encrypted database system with linear computation as well as efficient query ability, and enhance the interlayer program in the original  ...  The data outsourcing scheme of IoT devices demands privacy protection as well as computation verification since the lightweight devices not only outsource their data but also their computation.  ...  The IoT devices represents the data users which outsource their data sets to maintain a minimized local storage and computation load for a long duration.  ... 
doi:10.3837/tiis.2020.01.016 fatcat:sbqhlw5mfbfzxfsbc7wyqykuya

SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates [chapter]

Qian Wang, Kui Ren, Minxin Du, Qi Li, Aziz Mohaisen
2017 Lecture Notes in Computer Science  
Meanwhile, with the advent of cloud computing, data owners are highly motivated to outsource and store their massive potentially-sensitive graph data on remote untrusted servers in an encrypted form, expecting  ...  Specifically, our construction strategically makes use of efficient additively homomorphic encryption and garbled circuits to support the shortest distance queries with optimal time and storage complexities  ...  Meanwhile, with the advent of cloud computing, data owners are highly motivated to outsource and store their massive potentially-sensitive graph data on remote untrusted servers in an encrypted form, expecting  ... 
doi:10.1007/978-3-319-70972-7_5 fatcat:z75htory2bbedcdetn22a4wm2i

Is Quantum Search Practical?

G.F. Viamontes, I.L. Markov, J.P. Hayes
2005 Computing in science & engineering (Print)  
The authors show that several commonly suggested applications of Grover's quantum search algorithm fail to offer computational improvements over the best conventional algorithms.  ...  A search application S where classical methods don't provide sufficient scalability.  ...  The views and conclusions in this article are those of the authors and do not necessarily represent official policies or endorsements of their employers or funding agencies.  ... 
doi:10.1109/mcse.2005.53 fatcat:m4fcd2q3dveotme3pf6qkjhwmi

Processing Encrypted Data Using Homomorphic Encryption

Anthony Barnett, Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Anamaria Costache, Louis Goubin, Ilia Iliashenko, Tancrède Lepoint, Michele Minelli, Pascal Paillier, Nigel P. Smart (+3 others)
2017 Zenodo  
This bootstrapping operation is obtained by homomorphically evaluating the decryption circuit on input of the ciphertext to be bootstrapped and the encryption of the secret key.  ...  First a scheme is constructed which can evaluate arithmetic circuits of a limited depth, a so-called Somewhat Homomorphic Encryption (SHE) scheme.  ...  However, they are particularly focused on bitencryption and hence evaluation of binary circuits on encrypted data; thus in practice their efficiency does not match that of the second generation schemes  ... 
doi:10.5281/zenodo.2594694 fatcat:2fqubfuoj5c5flmc2ecrtx2g2y

Blind Seer: A Scalable Private DBMS

Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin, Seung Geol Choi, Wesley George, Angelos Keromytis, Steve Bellovin
2014 2014 IEEE Symposium on Security and Privacy  
We design, build, and evaluate the performance of a rich DBMS system, suitable for real-world deployment on today medium-to large-scale DBs.  ...  We support a rich query set, including searching on arbitrary boolean formulas on keywords and ranges, support for stemming, and free keyword searches over text fields.  ...  Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright annotation thereon.  ... 
doi:10.1109/sp.2014.30 dblp:conf/sp/PappasKVKMCGKB14 fatcat:muuma54ttnhktbsf3fakm2soom

An Approach for Privacy Preservation Assisted Secure Cloud Computation

Swathi Velugoti, M. P. Vani
2024 Informatica (Ljubljana, Tiskana izd.)  
Operating on encrypted data has long been a cryptanalytic conundrum.  ...  To navigate this challenge, our research introduces a secure architecture and an oracle for query vector outsourcing, underpinned by privacy-preserving homomorphic encryption.  ...  ability to facilitate computations on encrypted data without needing decryption.  ... 
doi:10.31449/inf.v47i10.4586 fatcat:qyzhv4zbt5cmlok6bxbhl2l7uu

FPGA-accelerated Searchable Encrypted Database Management Systems for Cloud Services

Mitsuhiro Okada, Takayuki Suzuki, Naoya Nishio, Hasitha Waidyasooriya, Masanori Hariyama
2020 IEEE Transactions on Cloud Computing  
On the other hand, encrypted query processing is slower than query processing on plaintext data.  ...  DBMSs that use searchable encryption have been investigated with regard to ensuring their security.  ...  Although these studies attempt to improve query processing speed, their approaches are limited to optimizing algorithms and using AES hardware in a CPU.  ... 
doi:10.1109/tcc.2020.2969655 fatcat:bt3n6g475vczxijjkzoayy2pum

Blind Web Search: How far are we from a privacy preserving search engine? [article]

Gizem S. Çetin, Wei Dai, Yarkin Doröz, William J. Martin, Berk Sunar
2016 IACR Cryptology ePrint Archive  
In this work, we focus on a natural application where privacy is a major concern: web search. An estimated 5 billion web queries are processed by the world's leading search engines each day.  ...  Recent rapid progress in fully homomorphic encryption (FHE) and somewhat homomorphic encryption (SHE) has catalyzed renewed efforts to develop efficient privacy preserving protocols.  ...  Fully homomorphic encryption (FHE) allows one to perform arbitrary computation on encrypted data without the need of a secret key [1] .  ... 
dblp:journals/iacr/CetinDDMS16 fatcat:xs42owb2jbbydeu2gblcvo5hj4

Secure Range Queries for Multiple Users [article]

Anselme Tueno, Florian Kerschbaum
2018 arXiv   pre-print
Imagine a scenario where a Data Owner encrypts its data before outsourcing it to the Cloud Service Provider and a Data Analyst wants to execute private range queries on this data.  ...  Order-preserving encryption allows encrypting data, while still enabling efficient range queries on the encrypted data.  ...  5] , [6] , [19] , [20] , [34] , [35] , exist that enable cloud users to encrypt their data before outsourcing it to the cloud while still be able to process and search on the outsourced and encrypted  ... 
arXiv:1802.01138v1 fatcat:6q4ne2tocbcofciozavmnbxjca

Homomorphic Comparison for Point Numbers with User-Controllable Precision and Its Applications

Heewon Chung, Myungsun Kim, Ahmad Al Badawi, Khin Mi Mi Aung, Bharadwaj Veeravalli
2020 Symmetry  
In particular, because lots of user data are expressed in non-integer data types, privacy-enhanced applications built on fully homomorphic encryption (FHE) must support real-valued comparisons due to the  ...  their bit length κ , which is normally small) while allowing users to determine the precision of the encrypted point numbers when running their applications.  ...  A natural solution to prevent privacy breaches of personal data stored in the cloud is to encrypt the data and delegate computations on encrypted data to the cloud.  ... 
doi:10.3390/sym12050788 fatcat:to53m24blzay5c3khp4r3ua67y

Private Collection Matching Protocols [article]

Kasra EdalatNejad, Mathilde Raynal, Wouter Lueks, Carmela Troncoso
2022 arXiv   pre-print
Our evaluation shows that we offer a privacy gain with respect to existing works at a reasonable communication and computation cost.  ...  We introduce Private Collection Matching (PCM) problems, in which a client aims to determine whether a collection of sets owned by a server matches their interests.  ...  Encrypted databases and ORAM [58, 59, 68] let a client query their own outsourced data.  ... 
arXiv:2206.07009v2 fatcat:xeikpvl3ezd5xcwfxxhbld4fx4
« Previous Showing results 1 — 15 out of 3,393 results