Sciweavers

24188 search results - page 42 / 4838
» Computing on Encrypted Data
Sort
View
IACR
2011
89views more  IACR 2011»
13 years 11 months ago
Threshold Fully Homomorphic Encryption and Secure Computation
Steven Myers, Mona Sergi, Abhi Shelat
IDEAS
2006
IEEE
152views Database» more  IDEAS 2006»
15 years 5 months ago
Querying Encrypted XML Documents
This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in “Database as a Service” (DAS) architectures, where a client may outsour...
Ravi Chandra Jammalamadaka, Sharad Mehrotra
TCC
2007
Springer
146views Cryptology» more  TCC 2007»
15 years 5 months ago
Conjunctive, Subset, and Range Queries on Encrypted Data
We construct public-key systems that support comparison queries (x ≥ a) on encrypted data as well as more general queries such as subset queries (x ∈ S). These systems support...
Dan Boneh, Brent Waters
SRDS
2010
IEEE
14 years 9 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
COMPUTER
2008
55views more  COMPUTER 2008»
14 years 12 months ago
Identity-Based Encryption Comes of Age
Luther Martin