搜索结果: 1-15 共查到“军事学 database”相关记录27条 . 查询时间(0.11 秒)
We present a scalable database join protocol for secret shared data in the honest majority three party setting. The key features of our protocol are a rich set of SQL-like join/select queries and the ...
Full Database Reconstruction with Access and Search Pattern Leakage
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2019/4/22
The widespread use of cloud computing has enabled several database providers to store their data on servers in the cloud and answer queries from those servers. In order to protect the confidentiality ...
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
Statistical Learning Theory Encrypted Database Attacks
2019/1/9
We show that the problem of reconstructing encrypted databases from access pattern leakage is closely related to statistical learning theory. This new viewpoint enables us to develop broader attacks t...
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
encrypted database volume leakage
2018/11/6
We present attacks that use only the volume of responses to range queries to reconstruct databases. Our focus is on practical attacks that work for large-scale databases with many values and records, ...
Privacy-Preserving Multibiometric Authentication in Cloud with Untrusted Database Providers
biometrics MPC protocols
2018/4/19
This paper introduces a secure and privacy-preserving mechanism for biometric-based user authentication in a distributed manner. The design combines three modalities (face, iris and fingerprint) accor...
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database
Deep Learning Side-Channel Analysis AES
2018/1/15
To provide insurance on the resistance of a system against side-channel analysis, several national or private schemes are today promoting an evaluation strategy, common in classical cryptography, whic...
Efficient Oblivious Data Structures for Database Services on the Cloud
Privacy-enhancing Technologies Oblivious Data Structure ORAM
2017/12/25
Database-as-a-service (DBaaS) allows the client to store and manage structured data on the cloud remotely. Despite its merits, DBaaS also brings significant privacy issues. Existing encryption techniq...
Thwarting Leakage Abuse Attacks against Searchable Encryption -- A Formal Approach and Applications to Database Padding
security definition searchable encryption leakage abuse attacks
2017/11/1
After the development of practical searchable encryption constructions, allowing for secure searches over an encrypted dataset outsourced to an untrusted server, at the expense of leaking some informa...
Can We Access a Database Both Locally and Privately?
private information retrieval locally decodable codes
2017/6/15
We consider the following strong variant of private information retrieval (PIR). There is a large database x that we want to make publicly available. To this end, we post an encoding X of x together w...
Encrypted databases, a popular approach to protecting data from compromised database management systems (DBMS’s), use abstract threat models that capture neither realistic databases, nor realistic att...
In recent years, encrypted databases have emerged as a promising direction that provides data confidentiality without sacrificing functionality: queries are executed on encrypted data. However, existi...
Private Database Access With HE-over-ORAM Architecture
Comparison Protocols Homomorphic Encryption ORAM
2016/1/9
Enabling private database queries is an important and challenging research problem with
many real-world applications. The goal is for the client to obtain the results of its queries without
learning...
The Feasibility of Outsourced Database Search in the Plain Model
Outsourced Computation Database Search Functionalities Lower Bound
2016/1/7
The problem of securely outsourcing computation to an untrusted server gained momentum with the
recent penetration of cloud computing services. The ultimate goal in this setting is to design efficien...
Database Outsourcing with Hierarchical Authenticated Data Structures
Databases outsourcing Hierarchical authenticated data structures Authenticated join processing
2015/12/31
In an outsourced database scheme, the data owner delegates the data management tasks to a remote service
provider. At a later time, the remote service is supposed to answer any query on the database....
PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service
implementation applications
2015/12/22
Cloud providers are realizing the outsourced database model in the form of database-as-a-service offerings. However, security in terms of data privacy remains an obstacle because data storage and proc...