搜索结果: 1-15 共查到“军事学 Query”相关记录20条 . 查询时间(0.016 秒)
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query
Location privacy Geohashing Spatial cloaking
2019/7/17
Location data is an important piece of contextual information in location-driven features for geosocial and pervasive computing applications. In this paper, we propose to geo-hash locations using spac...
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Encrypted Database Attack Range Query
2019/5/5
Recent foundational work on leakage-based attacks on encrypted databases has broadened our understanding of what an adversary can accomplish with a standard leakage profile. Nevertheless, all known va...
Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2018/8/2
Recent works by Kellaris et al. (CCS’16) and Lacharite et al. (SP’18) demonstrated attacks of data recovery for encrypted databases that support rich queries such as range queries. In this paper, we d...
Loamit: A Blockchain-based Residual Loanable-limit Query System
Blockchain loanable-limit bank
2018/7/9
Currently, the blockchain technology is experiencing an exponential growth in the academia and industry. Blockchain may provide the fault-tolerance, tamper-resistance, credibility and privacy to users...
Geosocial Query with User-Controlled Privacy
location privacy homomorphic encryption applications
2018/4/4
Geosocial applications collect (and record) users’ precise location data to perform proximity computations, such as notifying a user or triggering a service when a friend is within geographic proximit...
A New Functional Encryption for Multidimensional Range Query
Functional Encryption Multidimensional Range Query
2017/10/9
Functional encryption, which emerges in the community recently, is a generalized concept of traditional encryption (e.g. RSA and AES). In traditional encryption scheme, decrypting a ciphertext with a ...
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
Encrypted database leakage
2017/7/24
We analyse the security of database encryption schemes supporting range queries against persistent adversaries. Security against such an adversary captures, among other things, the privacy of the clie...
Authentication of Outsourced Linear Function Query with Efficient Updates
Efficient Updates higher efficiency
2017/4/19
Storing the large-scale data on the cloud server side becomes nowadays an alternative for the data owner with the popularity and maturity of the cloud computing technique, where the data owner can man...
Short Interactive Oracle Proofs with Constant Query Complexity, via Composition and Sumcheck
probabilistically checkable proofs interactive proofs proof composition
2016/3/24
We study *interactive oracle proofs* (IOPs) (Ben-Sasson, Chiesa, Spooner '16), which combine aspects of probabilistically checkable proofs (PCPs) and interactive proofs (IPs). We present IOP construct...
In this short article, we describe a very practical and simple attack on the authentication
part of POET authenticated encryption mode proposed at FSE 2014. POET is a
provably secure scheme that was...
On Concurrently Secure Computation in the Multiple Ideal Query Model
secure computation concurrent security
2015/12/30
The multiple ideal query (MIQ) model was introduced by Goyal, Jain and Ostrovsky [Crypto’10]
as a relaxed notion of security which allows one to construct concurrently secure protocols in the
plain ...
Concurrent Secure Computation with Optimal Query Complexity
secure computation concurrent security
2015/12/29
The multiple ideal query (MIQ) model [Goyal, Jain, and Ostrovsky, Crypto’10] offers a
relaxed notion of security for concurrent secure computation, where the simulator is allowed to
query the ideal ...
RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
Authentication Authenticated query processing
2014/3/5
In this paper we address the problem of authenticated query processing in outsourced databases. An authenticated query processing mechanism allows a client to verify the validity of the query response...
Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud
Outsourced Databases Flexible
2014/3/7
For securing databases outsourced to the cloud, it is important to allow cloud users to verify that their queries to the cloud-hosted databases are correctly executed by the cloud. Existing solutions ...
Towards Efficient Verifiable SQL Query for Outsourced Dynamic Databases in Cloud
Integrity Check Dynamic Database Outsource SQL Query Authenticated Data Structure Cloud Storage
2013/2/21
With the rising trend of outsourcing databases to the cloud, it is important to allow clients to securely verify that their queries on the outsourced databases are correctly executed by the cloud. Exi...