Pages that link to "Item:Q3627437"
From MaRDI portal
The following pages link to Order-Preserving Symmetric Encryption (Q3627437):
Displaying 31 items.
- Impossibility of order-revealing encryption in idealized models (Q1631321) (← links)
- A ciphertext-size lower bound for order-preserving encryption with limited leakage (Q1631322) (← links)
- Ciphertext expansion in limited-leakage order-preserving encryption: a tight computational lower bound (Q1631324) (← links)
- On the average cost of order-preserving encryption based on hypergeometric distribution (Q1944174) (← links)
- Processing secure, verifiable and efficient SQL over outsourced database (Q1991841) (← links)
- Integer polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sorting (Q2079218) (← links)
- Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model (Q2096495) (← links)
- Efficient multi-client order-revealing encryption and its applications (Q2148746) (← links)
- Encrypted key-value stores (Q2152022) (← links)
- Cloud-assisted secure biometric identification with sub-linear search efficiency (Q2152922) (← links)
- Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security (Q2167753) (← links)
- Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation (Q2194864) (← links)
- Semi-order preserving encryption (Q2293042) (← links)
- A novel vertical fragmentation method for privacy protection based on entropy minimization in a relational database (Q2333930) (← links)
- CDPS: a cryptographic data publishing system (Q2402351) (← links)
- A query privacy-enhanced and secure search scheme over encrypted data in cloud computing (Q2403229) (← links)
- Efficient request-based comparable encryption scheme based on sliding window method (Q2403279) (← links)
- Privacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectives (Q2663507) (← links)
- Privacy-preserving Krawtchouk moment feature extraction over encrypted image data (Q2666794) (← links)
- Enabling Compressed Encryption for Cloud Based Big Data Stores (Q3297626) (← links)
- Order-Preserving Symmetric Encryption (Q3627437) (← links)
- Practical Order-Revealing Encryption with Limited Leakage (Q4639494) (← links)
- An improved negative binomial approximation with high accuracy to the negative hypergeometric probability for order-preserving encryption (Q4978245) (← links)
- Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption (Q5056012) (← links)
- Verifiable Range Query Processing for Cloud Computing (Q5056027) (← links)
- Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries (Q5056028) (← links)
- Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity (Q5270359) (← links)
- Ad Hoc PSM Protocols: Secure Computation Without Coordination (Q5270377) (← links)
- Constraining Pseudorandom Functions Privately (Q5738766) (← links)
- MDOPE: efficient multi-dimensional data order preserving encryption scheme (Q6118667) (← links)
- Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection (Q6193395) (← links)