Private Searching on Streaming Data
From MaRDI portal
Publication:5451028
software securityprivacy-preserving data miningcode obfuscationdatabase securitymobile codecrypto-computingpublic-key encryption with special propertiesprivacy-preserving keyword searchPrivate Information retrievalsearching with privacysecure algorithms for streaming datasecure delegation of computation
Recommendations
Cited in
(18)- Efficient and scalable universal circuits
- Information and Communications Security
- Privacy preserving algorithm based on partial re-encode of streaming data
- Private searching on streaming data
- Obfuscation for cryptographic purposes
- Discrete logarithm based additively homomorphic encryption and secure data aggregation
- Finding composite order ordinary elliptic curves using the Cocks-Pinch method
- Breaking the circuit size barrier for secure computation under DDH
- Constraining pseudorandom functions privately
- Privacy Preserving Sequential Pattern Mining in Data Stream
- Privacy-preserving blueprints
- Cooperative private searching in clouds
- Threshold cryptography based on Asmuth-Bloom secret sharing
- A survey of privacy-preserving mechanisms for heterogeneous data types
- A Practical Universal Circuit Construction and Secure Evaluation of Private Functions
- Oblivious message retrieval
- Private stream search at almost the same communication cost as a regular search
- Pushing the limits of Valiant's universal circuits: simpler, tighter and more compact
This page was built for publication: Private Searching on Streaming Data
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451028)