Private Searching on Streaming Data
From MaRDI portal
Publication:5451028
software securityprivacy-preserving data miningcode obfuscationdatabase securitymobile codecrypto-computingpublic-key encryption with special propertiesprivacy-preserving keyword searchPrivate Information retrievalsearching with privacysecure algorithms for streaming datasecure delegation of computation
Recommendations
Cited in
(18)- A survey of privacy-preserving mechanisms for heterogeneous data types
- Breaking the circuit size barrier for secure computation under DDH
- Obfuscation for cryptographic purposes
- Constraining pseudorandom functions privately
- Discrete logarithm based additively homomorphic encryption and secure data aggregation
- A Practical Universal Circuit Construction and Secure Evaluation of Private Functions
- Pushing the limits of Valiant's universal circuits: simpler, tighter and more compact
- Private searching on streaming data
- Private stream search at almost the same communication cost as a regular search
- Threshold cryptography based on Asmuth-Bloom secret sharing
- Finding composite order ordinary elliptic curves using the Cocks-Pinch method
- Privacy-preserving blueprints
- Privacy preserving algorithm based on partial re-encode of streaming data
- Privacy Preserving Sequential Pattern Mining in Data Stream
- Efficient and scalable universal circuits
- Information and Communications Security
- Oblivious message retrieval
- Cooperative private searching in clouds
This page was built for publication: Private Searching on Streaming Data
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451028)