Private Database Access with HE-over-ORAM Architecture (Englisch)
- Neue Suche nach: Gentry, Craig
- Neue Suche nach: Halevi, Shai
- Neue Suche nach: Jutla, Charanjit
- Neue Suche nach: Raykova, Mariana
- Neue Suche nach: Malkin, Tal
- Neue Suche nach: Kolesnikov, Vladimir
- Neue Suche nach: Lewko, Allison Bishop
- Neue Suche nach: Polychronakis, Michalis
- Neue Suche nach: Gentry, Craig
- Neue Suche nach: Halevi, Shai
- Neue Suche nach: Jutla, Charanjit
- Neue Suche nach: Raykova, Mariana
In:
Applied Cryptography and Network Security
: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers
;
Kapitel: 9
;
172-191
;
2016
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Private Database Access with HE-over-ORAM Architecture
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Malkin, Tal ( Herausgeber:in ) / Kolesnikov, Vladimir ( Herausgeber:in ) / Lewko, Allison Bishop ( Herausgeber:in ) / Polychronakis, Michalis ( Herausgeber:in ) / Gentry, Craig ( Autor:in ) / Halevi, Shai ( Autor:in ) / Jutla, Charanjit ( Autor:in ) / Raykova, Mariana ( Autor:in )
-
Kongress:International Conference on Applied Cryptography and Network Security ; 2015 ; New York, USA
-
Erschienen in:Applied Cryptography and Network Security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers ; Kapitel: 9 ; 172-191Lecture Notes in Computer Science ; 9092 ; 172-191Security and Cryptology ; 172-191
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:09.01.2016
-
Format / Umfang:20 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Universally Verifiable Multiparty Computation from Threshold Homomorphic CryptosystemsSchoenmakers, Berry / Veeningen, Meilof et al. | 2016
- 2
-
Communication-Optimal Proactive Secret Sharing for Dynamic GroupsBaron, Joshua / Defrawy, Karim El / Lampkins, Joshua / Ostrovsky, Rafail et al. | 2016
- 3
-
Round-Optimal Password-Based Group Key Exchange Protocols in the Standard ModelXu, Jing / Hu, Xue-Xian / Zhang, Zhen-Feng et al. | 2016
- 4
-
Generic Construction of UC-Secure Oblivious TransferBlazy, Olivier / Chevalier, Céline et al. | 2016
- 5
-
Non-malleability Under Selective Opening Attacks: Implication and SeparationHuang, Zhengan / Liu, Shengli / Mao, Xianping / Chen, Kefei et al. | 2016
- 6
-
A Signature Scheme with a Fuzzy Private KeyTakahashi, Kenta / Matsuda, Takahiro / Murakami, Takao / Hanaoka, Goichiro / Nishigaki, Masakatsu et al. | 2016
- 7
-
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large UniverseLiu, Zhen / Wong, Duncan S. et al. | 2016
- 8
-
Zero-Knowledge Authenticated Order Queries and Order Statistics on a ListGhosh, Esha / Ohrimenko, Olga / Tamassia, Roberto et al. | 2016
- 9
-
Private Database Access with HE-over-ORAM ArchitectureGentry, Craig / Halevi, Shai / Jutla, Charanjit / Raykova, Mariana et al. | 2016
- 10
-
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic SignaturesSeo, Jae Hong / Emura, Keita / Xagawa, Keita / Yoneyama, Kazuki et al. | 2016
- 11
-
LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive DataJiang, Weiyu / Lin, Jingqiang / Wang, Zhan / Li, Huorong / Wang, Lei et al. | 2016
- 12
-
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data NetworkingCompagno, Alberto / Conti, Mauro / Gasti, Paolo / Mancini, Luigi Vincenzo / Tsudik, Gene et al. | 2016
- 13
-
Post-Quantum Forward-Secure Onion RoutingGhosh, Satrajit / Kate, Aniket et al. | 2016
- 14
-
Scalable Divisible E-cashCanard, Sébastien / Pointcheval, David / Sanders, Olivier / Traoré, Jacques et al. | 2016
- 15
-
Recovering Lost Device-Bound CredentialsBaldimtsi, Foteini / Camenisch, Jan / Hanzlik, Lucjan / Krenn, Stephan / Lehmann, Anja / Neven, Gregory et al. | 2016
- 16
-
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSAKircanski, Aleksandar et al. | 2016
- 17
-
Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPULu, Jiqiang / Li, Zhen / Henricksen, Matt et al. | 2016
- 18
-
Evaluation and Cryptanalysis of the Pandaka Lightweight CipherYarom, Yuval / Li, Gefei / Ranasinghe, Damith C. et al. | 2016
- 19
-
Cryptographic Enforcement of Information Flow Policies Without Public InformationCrampton, Jason / Farley, Naomi / Gutin, Gregory / Jones, Mark / Poettering, Bertram et al. | 2016
- 20
-
A Fully Decentralized Data Usage Control Enforcement InfrastructureKelbert, Florian / Pretschner, Alexander et al. | 2016
- 21
-
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online InformationSimeonovski, Milivoj / Bendun, Fabian / Asghar, Muhammad Rizwan / Backes, Michael / Marnau, Ninja / Druschel, Peter et al. | 2016
- 22
-
Exploiting Eye Tracking for Smartphone AuthenticationLiu, Dachuan / Dong, Bo / Gao, Xing / Wang, Haining et al. | 2016
- 23
-
Optimal Proximity Proofs RevisitedKılınç, Handan / Vaudenay, Serge et al. | 2016
- 24
-
Replacement Attacks: Automatically Impeding Behavior-Based Malware SpecificationsMing, Jiang / Xin, Zhi / Lan, Pengwei / Wu, Dinghao / Liu, Peng / Mao, Bing et al. | 2016
- 25
-
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption ExponentsTakayasu, Atsushi / Kunihiro, Noboru et al. | 2016
- 26
-
Differential Power Analysis of a McEliece CryptosystemChen, Cong / Eisenbarth, Thomas / von Maurich, Ingo / Steinwandt, Rainer et al. | 2016
- 27
-
Arithmetic Addition over Boolean MaskingSchneider, Tobias / Moradi, Amir / Güneysu, Tim et al. | 2016
- 28
-
Foundations of Reconfigurable PUFsSchneider, Jonas / Schröder, Dominique et al. | 2016
- 29
-
mrPUF: A Novel Memristive Device Based Physical Unclonable FunctionGao, Yansong / Ranasinghe, Damith C. / Al-Sarawi, Said F. / Kavehei, Omid / Abbott, Derek et al. | 2016
- 30
-
On the XOR of Multiple Random PermutationsMennink, Bart / Preneel, Bart et al. | 2016
- 31
-
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel AttacksAbdalla, Michel / Belaïd, Sonia / Pointcheval, David / Ruhault, Sylvain / Vergnaud, Damien et al. | 2016
- 32
-
Leakage-Resilient Cryptography over Large Finite Fields: Theory and PracticeAndrychowicz, Marcin / Masny, Daniel / Persichetti, Edoardo et al. | 2016
- 33
-
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak SourcesBackes, Michael / Kate, Aniket / Meiser, Sebastian / Ruffing, Tim et al. | 2016