A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Search-and-Compute on Encrypted Data
[chapter]
2015
Lecture Notes in Computer Science
Answering the above questions requires one to search and then compute over the encrypted databases in sequence. ...
In this work, we construct a unified framework so as to efficiently and privately process queries with "search" and "compute" operations. ...
Search-and-compute on Encrypted Data In this section, we show how to efficiently perform queries on encrypted data using the circuit primitives. ...
doi:10.1007/978-3-662-48051-9_11
fatcat:bqbbfkdz6fb3plyej6vurbcdb4
Achieving Fully Homomorphic Encryption in Security - A Survey
English
2016
International Journal of Computer Science and Engineering
English
The ability to process encrypted data led to a renewed interest in Homomorphisms and a new cryptographic primitive, Fully Homomorphic Encryption (FHE) emerged. ...
This paper provides a brief survey focusing on the development of HE to FHE and discussing all relevant research works in this direction in one section. ...
to search the data. ...
doi:10.14445/23488387/ijcse-v3i2p104
fatcat:wffou6y5c5f3bdqc3rwhjzkyom
Arx
2019
Proceedings of the VLDB Endowment
However, many practical proposals rely on a set of weak encryption schemes that have been shown to leak sensitive data. ...
In recent years, encrypted databases have emerged as a promising direction that provides data confidentiality without sacrificing functionality: queries are executed on encrypted data. ...
This research was supported by NSF CISE Expeditions #CCF-1730628, and gifts from the Sloan Foundation, Hellman Fellows Fund, Bakar Fund, Alibaba, Amazon, Ant Financial, Arm, Capital One, Ericsson, Facebook ...
doi:10.14778/3342263.3342641
fatcat:7rqpyv6n2rglth2h6wruknr4mu
Integrating Encrypted Cloud Database Services using Query Processing
2016
International Journal of Computer Applications
For that reason in this work proposed a new novel architecture SecureDBaaS which provides confidentiality and as well as allows concurrent execution of operations on encrypted data with distributed policy ...
In the cloud computing, original plain data must be accessible only by trusted parties that do not include internet and cloud providers or intermediaries. ...
schemei.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. so solution comes in three steps. ...
doi:10.5120/ijca2016911323
fatcat:3oy525qtg5gjbk5uihxlabgwri
Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing
2020
KSII Transactions on Internet and Information Systems
In this paper, we propose a data outsourcing scheme based on an encrypted database system with linear computation as well as efficient query ability, and enhance the interlayer program in the original ...
The data outsourcing scheme of IoT devices demands privacy protection as well as computation verification since the lightweight devices not only outsource their data but also their computation. ...
The IoT devices represents the data users which outsource their data sets to maintain a minimized local storage and computation load for a long duration. ...
doi:10.3837/tiis.2020.01.016
fatcat:sbqhlw5mfbfzxfsbc7wyqykuya
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates
[chapter]
2017
Lecture Notes in Computer Science
Meanwhile, with the advent of cloud computing, data owners are highly motivated to outsource and store their massive potentially-sensitive graph data on remote untrusted servers in an encrypted form, expecting ...
Specifically, our construction strategically makes use of efficient additively homomorphic encryption and garbled circuits to support the shortest distance queries with optimal time and storage complexities ...
Meanwhile, with the advent of cloud computing, data owners are highly motivated to outsource and store their massive potentially-sensitive graph data on remote untrusted servers in an encrypted form, expecting ...
doi:10.1007/978-3-319-70972-7_5
fatcat:z75htory2bbedcdetn22a4wm2i
Is Quantum Search Practical?
2005
Computing in science & engineering (Print)
The authors show that several commonly suggested applications of Grover's quantum search algorithm fail to offer computational improvements over the best conventional algorithms. ...
A search application S where classical methods don't provide sufficient scalability. ...
The views and conclusions in this article are those of the authors and do not necessarily represent official policies or endorsements of their employers or funding agencies. ...
doi:10.1109/mcse.2005.53
fatcat:m4fcd2q3dveotme3pf6qkjhwmi
Processing Encrypted Data Using Homomorphic Encryption
2017
Zenodo
This bootstrapping operation is obtained by homomorphically evaluating the decryption circuit on input of the ciphertext to be bootstrapped and the encryption of the secret key. ...
First a scheme is constructed which can evaluate arithmetic circuits of a limited depth, a so-called Somewhat Homomorphic Encryption (SHE) scheme. ...
However, they are particularly focused on bitencryption and hence evaluation of binary circuits on encrypted data; thus in practice their efficiency does not match that of the second generation schemes ...
doi:10.5281/zenodo.2594694
fatcat:2fqubfuoj5c5flmc2ecrtx2g2y
Blind Seer: A Scalable Private DBMS
2014
2014 IEEE Symposium on Security and Privacy
We design, build, and evaluate the performance of a rich DBMS system, suitable for real-world deployment on today medium-to large-scale DBs. ...
We support a rich query set, including searching on arbitrary boolean formulas on keywords and ranges, support for stemming, and free keyword searches over text fields. ...
Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright annotation thereon. ...
doi:10.1109/sp.2014.30
dblp:conf/sp/PappasKVKMCGKB14
fatcat:muuma54ttnhktbsf3fakm2soom
An Approach for Privacy Preservation Assisted Secure Cloud Computation
2024
Informatica (Ljubljana, Tiskana izd.)
Operating on encrypted data has long been a cryptanalytic conundrum. ...
To navigate this challenge, our research introduces a secure architecture and an oracle for query vector outsourcing, underpinned by privacy-preserving homomorphic encryption. ...
ability to facilitate computations on encrypted data without needing decryption. ...
doi:10.31449/inf.v47i10.4586
fatcat:qyzhv4zbt5cmlok6bxbhl2l7uu
FPGA-accelerated Searchable Encrypted Database Management Systems for Cloud Services
2020
IEEE Transactions on Cloud Computing
On the other hand, encrypted query processing is slower than query processing on plaintext data. ...
DBMSs that use searchable encryption have been investigated with regard to ensuring their security. ...
Although these studies attempt to improve query processing speed, their approaches are limited to optimizing algorithms and using AES hardware in a CPU. ...
doi:10.1109/tcc.2020.2969655
fatcat:bt3n6g475vczxijjkzoayy2pum
Blind Web Search: How far are we from a privacy preserving search engine?
[article]
2016
IACR Cryptology ePrint Archive
In this work, we focus on a natural application where privacy is a major concern: web search. An estimated 5 billion web queries are processed by the world's leading search engines each day. ...
Recent rapid progress in fully homomorphic encryption (FHE) and somewhat homomorphic encryption (SHE) has catalyzed renewed efforts to develop efficient privacy preserving protocols. ...
Fully homomorphic encryption (FHE) allows one to perform arbitrary computation on encrypted data without the need of a secret key [1] . ...
dblp:journals/iacr/CetinDDMS16
fatcat:xs42owb2jbbydeu2gblcvo5hj4
Secure Range Queries for Multiple Users
[article]
2018
arXiv
pre-print
Imagine a scenario where a Data Owner encrypts its data before outsourcing it to the Cloud Service Provider and a Data Analyst wants to execute private range queries on this data. ...
Order-preserving encryption allows encrypting data, while still enabling efficient range queries on the encrypted data. ...
5] , [6] , [19] , [20] , [34] , [35] , exist that enable cloud users to encrypt their data before outsourcing it to the cloud while still be able to process and search on the outsourced and encrypted ...
arXiv:1802.01138v1
fatcat:6q4ne2tocbcofciozavmnbxjca
Homomorphic Comparison for Point Numbers with User-Controllable Precision and Its Applications
2020
Symmetry
In particular, because lots of user data are expressed in non-integer data types, privacy-enhanced applications built on fully homomorphic encryption (FHE) must support real-valued comparisons due to the ...
their bit length κ , which is normally small) while allowing users to determine the precision of the encrypted point numbers when running their applications. ...
A natural solution to prevent privacy breaches of personal data stored in the cloud is to encrypt the data and delegate computations on encrypted data to the cloud. ...
doi:10.3390/sym12050788
fatcat:to53m24blzay5c3khp4r3ua67y
Private Collection Matching Protocols
[article]
2022
arXiv
pre-print
Our evaluation shows that we offer a privacy gain with respect to existing works at a reasonable communication and computation cost. ...
We introduce Private Collection Matching (PCM) problems, in which a client aims to determine whether a collection of sets owned by a server matches their interests. ...
Encrypted databases and ORAM [58, 59, 68] let a client query their own outsourced data. ...
arXiv:2206.07009v2
fatcat:xeikpvl3ezd5xcwfxxhbld4fx4
« Previous
Showing results 1 — 15 out of 3,393 results