搜索结果: 1-15 共查到“知识库 军事学 Range”相关记录21条 . 查询时间(0.125 秒)
Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More
Trapdoor functions range trapdoor hash power DDH
2019/9/3
Substantial work on trapdoor functions (TDFs) has led to many powerful notions and applications. However, despite tremendous work and progress, all known constructions have prohibitively large public ...
Traceable and linkable ring signatures, traceable range proofs and applications on regulatable privacy-preserving blockchains
regulatable blockchain privacy preserving decentralization
2019/8/19
Privacy protection has been extensively studied in the current blockchain research field. As representations, Monero and Zerocash have realized completely anonymous and amount-hiding transactions. How...
Forward and Backward-Secure Range-Searchable Symmetric Encryption
dynamic symmetric searchable encryption range query forward security
2019/5/21
Dynamic searchable symmetric encryption (DSSE) allows a client to search or update over an outsourced encrypted database. Range query is commonly needed (AsiaCrypt'18) but order-preserving encryption ...
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2019/4/22
In recent years, a number of attacks have been developed that can reconstruct encrypted one-dimensional databases that support range queries under the persistent passive adversary model. These attacks...
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
encrypted database volume leakage
2018/11/6
We present attacks that use only the volume of responses to range queries to reconstruct databases. Our focus is on practical attacks that work for large-scale databases with many values and records, ...
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security
Dynamic searchable symmetric encryption forward security backward security
2018/6/27
Dynamic searchable symmetric encryption (DSSE) is a useful cryptographic tool in the encrypted cloud storage. However, it has been reported that DSSE usually suffers from the file-injection attacks an...
Oblivious RAM protocols (ORAMs) allow a client to access data from an untrusted storage device without revealing to that device any information about their access pattern. Typically this is accomplish...
Bulletproofs: Efficient Range Proofs for Confidential Transactions
zero knowledge NIZK discrete logarithm problem
2017/11/13
We propose Bulletproofs, a new non-interactive zero-knowledge proof protocol with very short proofs and without a trusted setup; the proof size is only logarithmic in the witness size. Bulletproofs ar...
A New Functional Encryption for Multidimensional Range Query
Functional Encryption Multidimensional Range Query
2017/10/9
Functional encryption, which emerges in the community recently, is a generalized concept of traditional encryption (e.g. RSA and AES). In traditional encryption scheme, decrypting a ciphertext with a ...
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
Encrypted database leakage
2017/7/24
We analyse the security of database encryption schemes supporting range queries against persistent adversaries. Security against such an adversary captures, among other things, the privacy of the clie...
We present the first one-roundtrip protocol for performing range, range-aggregate, and order-by-limit
queries over encrypted data, that both provides semantic security and is efficient. We accomplish...
Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters
Boolean functions symmetric-key cryptography nonlinearity
2016/1/25
Nonlinearity and resiliency are well known as some of the most important cryptographic parameters of Boolean functions, it is actual the problem of the constructing of functions that have high nonline...
Predicate Encryption for Multi-Dimensional Range Queries from Lattices
public-key cryptography inner product
2016/1/5
We construct a lattice-based predicate encryption scheme for multi-dimensional range and multidimensional
subset queries. Our scheme is selectively secure and weakly attribute-hiding, and its securit...
Authenticated Range \& Closest Point Queries in Zero-Knowledge
Authenticated Range Closest Point Queries
2015/12/18
We present an efficient method for answering one-dimensional range and closest-point
queries in a verifiable and privacy-preserving manner. We consider a model where a data owner outsources
a datase...
Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists
Privacy Cloud Computing
2014/3/6
We present RASP, a new protocol for privacy-preserving range search and sort queries on encrypted data in the face of an untrusted data store. RASP has several advantages over existing work. First, RA...