搜索结果: 1-15 共查到“军事学 database”相关记录27条 . 查询时间(0.062 秒)
Fast Database Joins for Secret Shared Data
Set Intersection Database Join, Secret Sharing
font style='font-size:12px;'>
2019/5/21
We present a scalable database join protocol for secret shared data in the honest majority three party setting. The key features of our protocol are a rich set of SQL-like join/select queries and the ...
Full Database Reconstruction with Access and Search Pattern Leakage
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
font style='font-size:12px;'>
2019/4/22
The widespread use of cloud computing has enabled several database providers to store their data on servers in the cloud and answer queries from those servers. In order to protect the confidentiality ...
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
Statistical Learning Theory Encrypted Database Attacks
font style='font-size:12px;'>
2019/1/9
We show that the problem of reconstructing encrypted databases from access pattern leakage is closely related to statistical learning theory. This new viewpoint enables us to develop broader attacks t...
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
encrypted database volume leakage
font style='font-size:12px;'>
2018/11/6
We present attacks that use only the volume of responses to range queries to reconstruct databases. Our focus is on practical attacks that work for large-scale databases with many values and records, ...
Privacy-Preserving Multibiometric Authentication in Cloud with Untrusted Database Providers
biometrics MPC protocols
font style='font-size:12px;'>
2018/4/19
This paper introduces a secure and privacy-preserving mechanism for biometric-based user authentication in a distributed manner. The design combines three modalities (face, iris and fingerprint) accor...
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database
Deep Learning Side-Channel Analysis AES
font style='font-size:12px;'>
2018/1/15
To provide insurance on the resistance of a system against side-channel analysis, several national or private schemes are today promoting an evaluation strategy, common in classical cryptography, whic...
Efficient Oblivious Data Structures for Database Services on the Cloud
Privacy-enhancing Technologies Oblivious Data Structure ORAM
font style='font-size:12px;'>
2017/12/25
Database-as-a-service (DBaaS) allows the client to store and manage structured data on the cloud remotely. Despite its merits, DBaaS also brings significant privacy issues. Existing encryption techniq...
Thwarting Leakage Abuse Attacks against Searchable Encryption -- A Formal Approach and Applications to Database Padding
security definition searchable encryption leakage abuse attacks
font style='font-size:12px;'>
2017/11/1
After the development of practical searchable encryption constructions, allowing for secure searches over an encrypted dataset outsourced to an untrusted server, at the expense of leaking some informa...
Can We Access a Database Both Locally and Privately?
private information retrieval locally decodable codes
font style='font-size:12px;'>
2017/6/15
We consider the following strong variant of private information retrieval (PIR). There is a large database x that we want to make publicly available. To this end, we post an encoding X of x together w...
Why Your Encrypted Database Is Not Secure
encrypted databases security definitions
font style='font-size:12px;'>
2017/5/31
Encrypted databases, a popular approach to protecting data from compromised database management systems (DBMS’s), use abstract threat models that capture neither realistic databases, nor realistic att...
Arx: A Strongly Encrypted Database System
cryptographic protocols encrypted database
font style='font-size:12px;'>
2016/6/8
In recent years, encrypted databases have emerged as a promising direction that provides data confidentiality without sacrificing functionality: queries are executed on encrypted data. However, existi...
Private Database Access With HE-over-ORAM Architecture
Comparison Protocols Homomorphic Encryption ORAM
font style='font-size:12px;'>
2016/1/9
Enabling private database queries is an important and challenging research problem with
many real-world applications. The goal is for the client to obtain the results of its queries without
learning...
The Feasibility of Outsourced Database Search in the Plain Model
Outsourced Computation Database Search Functionalities Lower Bound
font style='font-size:12px;'>
2016/1/7
The problem of securely outsourcing computation to an untrusted server gained momentum with the
recent penetration of cloud computing services. The ultimate goal in this setting is to design efficien...
Database Outsourcing with Hierarchical Authenticated Data Structures
Databases outsourcing Hierarchical authenticated data structures Authenticated join processing
font style='font-size:12px;'>
2015/12/31
In an outsourced database scheme, the data owner delegates the data management tasks to a remote service
provider. At a later time, the remote service is supposed to answer any query on the database....
PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service
implementation applications
font style='font-size:12px;'>
2015/12/22
Cloud providers are realizing the outsourced database model in the form of database-as-a-service offerings. However, security in terms of data privacy remains an obstacle because data storage and proc...