Sciweavers

656 search results - page 102 / 132
» Noiseless Database Privacy
Sort
View
TCC
2005
Springer
95views Cryptology» more  TCC 2005»
15 years 7 months ago
Keyword Search and Oblivious Pseudorandom Functions
We study the problem of privacy-preserving access to a database. Particularly, we consider the problem of privacy-preserving keyword search (KS), where records in the database are ...
Michael J. Freedman, Yuval Ishai, Benny Pinkas, Om...
108
Voted
VLDB
2005
ACM
114views Database» more  VLDB 2005»
15 years 7 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia
SDMW
2004
Springer
15 years 7 months ago
Using Secret Sharing for Searching in Encrypted Data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
Richard Brinkman, Jeroen Doumen, Willem Jonker
110
Voted
DEXAW
2003
IEEE
122views Database» more  DEXAW 2003»
15 years 7 months ago
Fairness in Wallets with Observer
We examine the interference of fairness and observers in digital coin systems. Since copying of coins cannot be prevented cryptographically in anonymous off-line coin systems, dou...
Heike Neumann, Thomas Schwarzpaul
100
Voted
GI
2001
Springer
15 years 6 months ago
Private Information Retrieval
In e-commerce, the protection of user privacy from a server was not considered feasible until the private information retrieval (PIR) problem was stated recently. A PIR protocol a...
Dmitri Asonov