搜索结果: 1-9 共查到“range queries”相关记录9条 . 查询时间(0.046 秒)
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2019/4/22
In recent years, a number of attacks have been developed that can reconstruct encrypted one-dimensional databases that support range queries under the persistent passive adversary model. These attacks...
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
encrypted database volume leakage
2018/11/6
We present attacks that use only the volume of responses to range queries to reconstruct databases. Our focus is on practical attacks that work for large-scale databases with many values and records, ...
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security
Dynamic searchable symmetric encryption forward security backward security
2018/6/27
Dynamic searchable symmetric encryption (DSSE) is a useful cryptographic tool in the encrypted cloud storage. However, it has been reported that DSSE usually suffers from the file-injection attacks an...
We present the first one-roundtrip protocol for performing range, range-aggregate, and order-by-limit
queries over encrypted data, that both provides semantic security and is efficient. We accomplish...
Given a set P of n uncertain points on the real line, each rep-resented by its one-dimensional probability density function, we consider the problem of building data structures on P to answer range qu...
Predicate Encryption for Multi-Dimensional Range Queries from Lattices
public-key cryptography inner product
2016/1/5
We construct a lattice-based predicate encryption scheme for multi-dimensional range and multidimensional
subset queries. Our scheme is selectively secure and weakly attribute-hiding, and its securit...
We construct public-key systems that support comparison queries (x > a) on encrypted data as well as more general queries such as subset queries (x in S). These systems also support arbitrary conjunct...
Authenticating Aggregate Range Queries over Multidimensional Dataset
Authentication Aggregate Query Database Outsourcing
2010/2/1
We are interested in the integrity of the query results from
an outsourced database service provider. Alice passes a set D
of d-dimensional points, together with some authentication
tag T, to an un...
Conjunctive, Subset, and Range Queries on Encrypted Data
Subset Range Queries Encrypted Data
2008/12/15
We construct public-key systems that support comparison queries (x a) on encrypted
data as well as more general queries such as subset queries (x 2 S). These systems support
arbitrary conjunctive ...