Sciweavers

24188 search results - page 42 / 4838
» Computing on Encrypted Data
Sort
View
IACR
2011
89views more  IACR 2011»
13 years 9 months ago
Threshold Fully Homomorphic Encryption and Secure Computation
Steven Myers, Mona Sergi, Abhi Shelat
IDEAS
2006
IEEE
152views Database» more  IDEAS 2006»
15 years 4 months ago
Querying Encrypted XML Documents
This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in “Database as a Service” (DAS) architectures, where a client may outsour...
Ravi Chandra Jammalamadaka, Sharad Mehrotra
TCC
2007
Springer
146views Cryptology» more  TCC 2007»
15 years 4 months ago
Conjunctive, Subset, and Range Queries on Encrypted Data
We construct public-key systems that support comparison queries (x ≥ a) on encrypted data as well as more general queries such as subset queries (x ∈ S). These systems support...
Dan Boneh, Brent Waters
SRDS
2010
IEEE
14 years 7 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
COMPUTER
2008
55views more  COMPUTER 2008»
14 years 10 months ago
Identity-Based Encryption Comes of Age
Luther Martin