Amorim et al., 2023 - Google Patents
Homomorphic Encryption: An Analysis of its Applications in Searchable EncryptionAmorim et al., 2023
View PDF- Document ID
- 3938594017396656094
- Author
- Amorim I
- Costa I
- Publication year
- Publication venue
- arXiv preprint arXiv:2306.14407
External Links
Snippet
The widespread adoption of cloud infrastructures has revolutionised data storage and access. However, it has also raised concerns regarding the privacy of sensitive data stored in the cloud. To address these concerns, encryption techniques have been widely used …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Secure skyline queries on cloud platform | |
Bösch et al. | A survey of provably secure searchable encryption | |
Lu | Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud. | |
Liu et al. | Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions | |
Liu et al. | Secure and efficient skyline queries on encrypted data | |
Andola et al. | Searchable encryption on the cloud: a survey | |
Ge et al. | SPPS: A search pattern privacy system for approximate shortest distance query of encrypted graphs in IIoT | |
Hamlin et al. | Cryptography for Big Data Security. | |
Mohammed et al. | Secure and private management of healthcare databases for data mining | |
Tang et al. | Privacy-preserving multi-keyword search in information networks | |
CN112332979A (en) | Ciphertext searching method, system and equipment in cloud computing environment | |
Guo et al. | A provably secure and efficient range query scheme for outsourced encrypted uncertain data from cloud-based Internet of Things systems | |
Amorim et al. | Leveraging searchable encryption through homomorphic encryption: A comprehensive analysis | |
Sakellariou et al. | Homomorphically encrypted k-means on cloud-hosted servers with low client-side load | |
Amorim et al. | Homomorphic Encryption: An Analysis of its Applications in Searchable Encryption | |
Kim et al. | Privacy-preserving parallel kNN classification algorithm using index-based filtering in cloud computing | |
Kumar et al. | Approaches and challenges of privacy preserving search over encrypted data | |
Park et al. | PKIS: practical keyword index search on cloud datacenter | |
Kim et al. | Privacy-preserving k NN query processing algorithms via secure two-party computation over encrypted database in cloud computing | |
Raghavendra et al. | Survey on data storage and retrieval techniques over encrypted cloud data | |
Wang et al. | Secure string pattern query for open data initiative | |
Sammeta et al. | Medical data analytics for secure multi-party-primarily based cloud computing utilizing homomorphic encryption | |
Vora et al. | Keyword-based private searching on cloud data along with keyword association and dissociation using cuckoo filter | |
Cruz et al. | Secure similarity joins using fully homomorphic encryption | |
Noorallahzadeh et al. | Searchable encryption taxonomy: Survey |