搜索结果: 1-15 共查到“军事学 retrieval”相关记录30条 . 查询时间(0.187 秒)
A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement
blockchain collateral decentralized ledger
2019/5/23
We present a protocol for a cryptoeconomic fair exchange of data previously owned by the purchaser for tokens that functions even when both parties are anonymous. This enables peer-to-peer data storag...
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio
Leakage-resilience Bounded retrieval model Identity-based Encryption
2019/1/26
We propose new constructions of leakage-resilient public-key encryption (PKE) and identity-based encryption (IBE) schemes in the bounded retrieval model (BRM). In the BRM, adversaries are allowed to o...
Private Stateful Information Retrieval
cryptographic protocols Private information retrieval
2018/11/12
Private information retrieval (PIR) is a fundamental tool for preserving query privacy when accessing outsourced data. All previous PIR constructions have significant costs preventing widespread use. ...
Secure Data Retrieval On The Cloud Homomorphic Encryption Meets Coresets
secure search secure report fully homomorphic encryption
2018/11/5
emph{Secure Report} is the problem of retrieving from a database table (e.g. on the cloud) all records matching specified attributes, as in SQL SELECT queries, but where the query and possibly the dat...
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval
secure computation multi-party computation (MPC) oblivious RAM (ORAM)
2018/4/17
Multi-Party Computation of Oblivious RAM (MPC ORAM) implements secret-shared random access memory in a way that protects access pattern privacy against a threshold of corruptions. MPC ORAM enables sec...
A practical, perfectly secure password scheme in the bounded retrieval model
secret-key cryptography bounded retrieval model
2017/9/25
In this paper, we present a practical password scheme due to Spilman, which is perfectly secure in the bounded retrieval model, assuming ideal hash functions. The construction is based on a hash-like ...
Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks
AES access-driven cache attacks
2017/9/21
Leakage of information between two processes sharing the same processor cache has been exploited in many novel approaches targeting various cryptographic algorithms. The software implementation of AES...
Industrial Feasibility of Private Information Retrieval
Private Information retrieval Survey Implementation
2017/9/1
A popular security problem in database management is how to guarantee to a querying party that the database owner will not learn anything about the data that is retrieved --- a problem known as Privat...
Private Information Retrieval (PIR) allows a client to obtain data from a public database without disclosing the locations accessed. Traditionally, the stress is on preserving sublinear work for the c...
Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model
bounded retrieval model non-malleable codes locally decodable codes
2017/4/11
In a recent result, Dachman-Soled et al.(TCC '15) proposed a new notion called locally decodable and updatable non-malleable codes, which informally, provides the security guarantees of a non-malleabl...
A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval
reputation sytem trustless anonymity
2016/5/3
Reputation systems are a major feature of every
modern e-commerce website, helping buyers carefully choose
their service providers and products. However, most websites use
centralized reputation sy...
rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval
Private Information Retrieval Secret Sharing
2016/1/26
Even as data and analytics driven applications are becoming increasingly popular, retrieving data from
shared databases poses a threat to the privacy of their users. For example, investors/patients r...
XPIR: Private Information Retrieval for Everyone
Lattices Homomorphic Encryption Private Information Retrieval
2016/1/5
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record from a database while hiding which from the database administrators. PIR can be achieved using mutually-di...
Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)
Content-Based Image Retrieval (CBIR) Searchable Symmetric Encryption (SSE) Encrypted Data Processing
2015/12/24
Storage requirements for visual data have been increasing in recent years, following the emergence of many new
highly interactive multimedia services and applications for both personal and corporate ...
On Basing Private Information Retrieval on NP-Hardness
Private Information Retrieval NP-hardness Reductions
2015/12/21
The possibility of basing the security of cryptographic objects on the (minimal) assumption
that NP ⊈ BPP is at the very heart of complexity-theoretic cryptography. Most known results
along th...