Ghosh et al., 2016 - Google Patents
Efficient verifiable range and closest point queries in zero-knowledgeGhosh et al., 2016
View PDF- Document ID
- 4394753558408935550
- Author
- Ghosh E
- Ohrimenko O
- Tamassia R
- Publication year
- Publication venue
- Proceedings on Privacy Enhancing Technologies
External Links
Snippet
We present an efficient method for answering one-dimensional range and closest-point queries in a verifiable and privacy-preserving manner. We consider a model where a data owner outsources a dataset of keyvalue pairs to a server, who answers range and …
- 238000010276 construction 0 abstract description 21
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | An efficient blockchain-based hierarchical data sharing for healthcare internet of things | |
Yang et al. | Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage | |
Miao et al. | Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage | |
Li et al. | Certificateless public integrity checking of group shared data on cloud storage | |
Lin et al. | A new transitively closed undirected graph authentication scheme for blockchain-based identity management systems | |
Yu et al. | Strong key-exposure resilient auditing for secure cloud storage | |
Zheng et al. | VABKS: Verifiable attribute-based keyword search over outsourced encrypted data | |
Zhu et al. | Dynamic audit services for outsourced storages in clouds | |
Backes et al. | Verifiable delegation of computation on outsourced data | |
Wang et al. | Efficiently revocable and searchable attribute-based encryption scheme for mobile cloud storage | |
Luong et al. | Privacy-preserving identity management system on blockchain using Zk-SNARK | |
Yan et al. | Efficient identity-based public integrity auditing of shared data in cloud storage with user privacy preserving | |
Morales-Sandoval et al. | Attribute-based encryption approach for storage, sharing and retrieval of encrypted data in the cloud | |
Yang et al. | A compressive integrity auditing protocol for secure cloud storage | |
Zhang et al. | Conditional anonymous certificateless public auditing scheme supporting data dynamics for cloud storage systems | |
Jiang et al. | Private keyword-search for database systems against insider attacks | |
Fan et al. | Verifiable attribute-based multi-keyword search over encrypted cloud data in multi-owner setting | |
Nithya et al. | Identity‐Based Public Auditing Scheme for Cloud Storage with Strong Key‐Exposure Resilience | |
Ghopur et al. | Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation | |
Liu et al. | Verifiable attribute-based keyword search encryption with attribute revocation for electronic health record system | |
CN116996870A (en) | Traceable and revocable decentralized CP-ABE privacy protection method and system | |
Tran et al. | Efficient verifiable computation of linear and quadratic functions over encrypted data | |
CN117896066B (en) | A searchable encryption method for verifiable multi-user authorization across domains based on dual-chain architecture | |
Jing et al. | Communication-efficient verifiable data streaming protocol in the multi-user setting | |
Ghosh et al. | Efficient verifiable range and closest point queries in zero-knowledge |