搜索结果: 1-7 共查到“军队指挥学 range queries”相关记录7条 . 查询时间(0.093 秒)
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2019/4/22
In recent years, a number of attacks have been developed that can reconstruct encrypted one-dimensional databases that support range queries under the persistent passive adversary model. These attacks...
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
encrypted database volume leakage
2018/11/6
We present attacks that use only the volume of responses to range queries to reconstruct databases. Our focus is on practical attacks that work for large-scale databases with many values and records, ...
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security
Dynamic searchable symmetric encryption forward security backward security
2018/6/27
Dynamic searchable symmetric encryption (DSSE) is a useful cryptographic tool in the encrypted cloud storage. However, it has been reported that DSSE usually suffers from the file-injection attacks an...
We present the first one-roundtrip protocol for performing range, range-aggregate, and order-by-limit
queries over encrypted data, that both provides semantic security and is efficient. We accomplish...
Predicate Encryption for Multi-Dimensional Range Queries from Lattices
public-key cryptography inner product
2016/1/5
We construct a lattice-based predicate encryption scheme for multi-dimensional range and multidimensional
subset queries. Our scheme is selectively secure and weakly attribute-hiding, and its securit...
Authenticating Aggregate Range Queries over Multidimensional Dataset
Authentication Aggregate Query Database Outsourcing
2010/2/1
We are interested in the integrity of the query results from
an outsourced database service provider. Alice passes a set D
of d-dimensional points, together with some authentication
tag T, to an un...
Conjunctive, Subset, and Range Queries on Encrypted Data
Subset Range Queries Encrypted Data
2008/12/15
We construct public-key systems that support comparison queries (x a) on encrypted
data as well as more general queries such as subset queries (x 2 S). These systems support
arbitrary conjunctive ...